Malware & RansomwareHIGH

Speagle Malware - Hijacks Cobra DocGuard to Steal Data

CSCyber Security News
SpeagleCobra DocGuardEsafeNetRunningcrab
🎯

Basically, Speagle is a malware that sneaks into a program to steal sensitive information.

Quick Summary

A new malware named Speagle is targeting Cobra DocGuard, stealing sensitive data through compromised servers. Organizations using this software are at high risk. Immediate action is needed to secure systems and prevent data theft.

What Happened

A newly identified malware called Speagle has emerged as a significant threat, specifically targeting organizations using Cobra DocGuard, a document security and encryption platform developed by EsafeNet. This infostealer malware is designed to blend seamlessly into its host environment, using the very software it targets to cover its data theft operations. Unlike typical malware, Speagle actively seeks out files related to highly sensitive subjects, including documents about Chinese ballistic missiles.

Cobra DocGuard has a concerning security history, having been exploited in past attacks. For instance, in September 2022, attackers used it in a supply chain attack against a gambling company in Hong Kong. Again, in August 2023, a threat actor known as Carderbee exploited the platform to deploy the Korplug backdoor against organizations in Hong Kong and parts of Asia. This pattern of exploitation has made Cobra DocGuard a frequent target for cybercriminals.

How It Works

Speagle operates as a 32-bit .NET executable and only functions fully on systems where Cobra DocGuard is installed. The threat actor behind Speagle has been named Runningcrab, although there is no confirmed link to any known threat groups. Analysts suggest that the malware is likely the work of either a state-sponsored actor or a skilled private contractor, given its specific targeting of Cobra DocGuard users and focus on defense-related documents.

The infection vector remains unclear, but early indicators suggest a possible supply chain attack. Speagle cleverly uses a legitimate Cobra DocGuard driver, the FileLock driver, to remove itself after completing its operations. This self-deletion technique is indicative of Trojanized software updates, showcasing the attacker's familiarity with the internal components of the software.

Who's Being Targeted

Organizations that utilize Cobra DocGuard are at high risk. Speagle confirms the presence of Cobra DocGuard by checking specific Windows registry keys. Once confirmed, it embarks on a structured, multi-phase data collection process. The first phase involves gathering the machine’s username, hostname, and unique Cobra DocGuard client identifiers. If no valid client ID is found, Speagle triggers its self-delete routine and exits.

In the second phase, Speagle collects extensive system information, including running processes, network connections, and installed services. The third phase targets browser data, pulling details such as browsing history and saved passwords. Notably, one variant of Speagle searches for documents using Chinese-language keywords related to defense technology, indicating a targeted approach.

How to Protect Yourself

Organizations running Cobra DocGuard should take immediate action. They need to audit outbound network traffic for unexpected connections to specific IP addresses associated with Speagle. It is crucial to update endpoint detection tools to flag Speagle’s known file hashes. Additionally, administrators should verify the integrity of their Cobra DocGuard server installations and review software update channels for unauthorized modifications.

Implementing robust security measures is essential. Regularly updating endpoint protection signatures and monitoring network traffic can help mitigate the risk posed by Speagle. By staying vigilant, organizations can better protect themselves against this sophisticated malware threat.

🔒 Pro insight: The use of legitimate software components for data exfiltration highlights a sophisticated level of planning by the attackers, indicating potential state-sponsored involvement.

Original article from

Cyber Security News · Tushar Subhra Dutta

Read Full Article

Related Pings

HIGHMalware & Ransomware

GSocket Backdoor - Malicious Bash Script Discovered

A malicious Bash script has been discovered that installs a GSocket backdoor on victims' computers. This poses a significant risk as the source and delivery method remain unknown. Users should be vigilant and avoid executing untrusted scripts.

SANS ISC·
HIGHMalware & Ransomware

DDoS Botnets Disrupted - International Action Taken

International authorities have disrupted major DDoS botnets targeting IoT devices. Millions of devices were compromised, causing significant service disruptions. This operation aims to prevent future attacks and protect critical infrastructure.

BleepingComputer·
HIGHMalware & Ransomware

DDoS Botnets Disrupted - Aisuru and Kimwolf Targeted

An international operation has disrupted major DDoS botnets Aisuru and Kimwolf, impacting over 3 million devices. This highlights the ongoing threat of IoT botnets and the need for robust security measures.

SecurityWeek·
HIGHMalware & Ransomware

Malware - SILENTCONNECT Deploys ScreenConnect via VBScript

SILENTCONNECT malware is stealthily targeting Windows machines, using VBScript and PowerShell to deploy ScreenConnect. This poses a significant risk to corporate security. Organizations must enhance their defenses to combat this sophisticated threat.

Cyber Security News·
HIGHMalware & Ransomware

Malware - DoJ Disrupts Massive IoT Botnets Behind DDoS Attacks

The DoJ has disrupted major IoT botnets responsible for record DDoS attacks. Over 3 million devices were compromised, impacting global internet infrastructure. This operation highlights the ongoing threat of IoT vulnerabilities.

The Hacker News·
HIGHMalware & Ransomware

EDR Killers Explained - Attackers Abuse Vulnerable Drivers

ESET researchers reveal the growing threat of EDR killers in ransomware attacks. These tools disable security measures, making organizations vulnerable. Understanding their operation is crucial for effective defense.

WeLiveSecurity (ESET)·