Speagle Malware Hijacks Cobra DocGuard to Steal Data via Compromised Servers
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得通读整篇文章,抓住主要信息。 文章讲的是一个新的恶意软件Speagle,它利用合法软件Cobra DocGuard的功能和基础设施进行网络间谍活动。Symantec和Carbon Black的研究人员指出,Speagle会秘密收集感染计算机的敏感信息,并将其传输到被攻击者入侵的Cobra DocGuard服务器上。这使得数据外泄看起来像是正常的客户端和服务器通信。 Cobra DocGuard是由EsafeNet开发的文档安全和加密平台。过去曾有两次记录显示该软件被用于真实攻击中。第一次是在2023年1月,ESET记录了一起针对香港赌博公司的入侵事件,攻击者通过恶意更新传播恶意软件。第二次是在2023年8月,Symantec发现了一个名为Carderbee的新威胁集群,利用了该程序的特洛伊木马版本来部署PlugX后门程序。 Speagle目前尚未被归因于任何特定的攻击者,但研究人员推测可能是国家资助的行动或私人承包商所为。恶意软件通过供应链攻击传播的可能性较大。Speagle不仅使用合法的Cobra DocGuard服务器作为命令与控制中心和数据外泄点,还利用相关驱动程序删除自身以避免被发现。 此外,一种变种的Speagle能够开启或关闭某些类型的数据收集功能,并搜索与东风-27等中国弹道导弹相关的文件。研究人员指出,Speagle是一种聪明的寄生威胁,利用Cobra DocGuard客户端掩盖其恶意活动,并利用其基础设施隐藏外泄流量。 现在我需要将这些信息浓缩到100字以内。重点包括:恶意软件名称、利用合法软件、数据收集和传输、可能的攻击者类型、传播方式以及目标敏感信息。 最终总结应简洁明了,涵盖主要点:恶意软件名称、功能、目标、传播方式及潜在影响。 </think> 一种名为Speagle的新恶意软件利用合法文档安全软件Cobra DocGuard的功能和基础设施进行网络间谍活动。该恶意软件从感染计算机中秘密收集敏感信息并将其传输到被入侵的服务器上,伪装成正常通信以掩盖数据外泄过程。研究人员推测其可能由国家资助或私人承包商实施,并通过供应链攻击传播。目标包括特定文件夹中的系统信息和浏览器历史记录等敏感数据。 2026-3-19 19:16:0 Author: thehackernews.com(查看原文) 阅读量:13 收藏

Cyber Espionage / Threat Intelligence

Cybersecurity researchers have flagged a new malware dubbed Speagle that hijacks the functionality and infrastructure of a legitimate program called Cobra DocGuard.

"Speagle is designed to surreptitiously harvest sensitive information from infected computers and transmit it to a Cobra DocGuard server that has been compromised by the attackers, masking the data exfiltration process as legitimate communications between client and server," Symantec and Carbon Black researchers said in a report published today.

Cobra DocGuard is a document security and encryption platform developed by EsafeNet. The abuse of this software in real-world attacks has been publicly recorded twice to date. In January 2023, ESET documented an intrusion where a gambling company in Hong Kong was compromised in September 2022 via a malicious update pushed by the software.

Later that August, Symantec highlighted the activity of a new threat cluster codenamed Carderbee, which was found using a trojanized version of the program to deploy PlugX, a backdoor widely used by Chinese hacking groups like Mustang Panda. The attacks targeted multiple organizations in Hong Kong and other Asian countries.

Speagle remains unattributed to date. But what makes the malware noteworthy is that it's designed to gather and exfiltrate data from only those systems that have the Cobra DocGuard data protection software installed. The activity is being tracked under the moniker Runningcrab.

"This indicates deliberate targeting, possibly to facilitate intelligence collection or industrial espionage," the Broadcom-owned threat hunting teams said. "At present, we believe the most likely hypotheses are that it is either the work of a state-sponsored actor or the work of a private contractor available for hire."

Exactly how the malware is delivered to victims is unknown, although it's suspected that it may have been done via a supply chain attack, as evidenced by the two aforementioned cases. 

In addition, the central role played by the security software and its infrastructure deserves a mention. Not only does Speagle use a legitimate Cobra DocGuard server for command-and-control (C2) and as a data exfiltration point, it also invokes a driver associated with the program to delete itself from the compromised host.

The 32-bit .NET executable, once launched, first checks the installation folder of Cobra DocGuard and then proceeds to harvest and transmit data from the infected machine in phases. This includes details about the system and files located in specific folders, such as those that contain web browser history and autofill data.

What's more, one variant of Speagle has been found to incorporate additional functionality to turn on/off certain types of data collection, as well as search for files related to Chinese ballistic missiles like Dongfeng-27 (aka DF-27).

"Speagle is a novel, parasitic threat that cleverly makes use of Cobra DocGuard's client to mask its malicious activity and its infrastructure to hide exfiltration traffic," researchers said. "Its developer no doubt took notice of previous supply chain attacks using the software and may have selected it both for its perceived vulnerability and its high rate of use among targeted organizations."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/03/speagle-malware-hijacks-cobra-docguard.html
如有侵权请联系:admin#unsafe.sh