Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Speagle malware hijacks Cobra DocGuard and steals data via compromised servers

54 EDR killers use BYOVD to exploit 34 signed vulnerability drivers to disable security

In the end Meta decided not to shut down Horizon Worlds on VR

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Speagle malware hijacks Cobra DocGuard and steals data via compromised servers
Identity

Speagle malware hijacks Cobra DocGuard and steals data via compromised servers

By March 19, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananMarch 19, 2026Cyber ​​espionage/threat intelligence

Cybersecurity researchers have reported a new malware called Speagle that hijacks the functionality and infrastructure of a legitimate program called Cobra DocGuard.

“Speagle is designed to covertly collect sensitive information from infected computers and send it to a Cobra DocGuard server that has been compromised by an attacker, masking the data exfiltration process as a legitimate communication between client and server,” researchers from Symantec and Carbon Black said in a report released today.

Cobra DocGuard is a document security and encryption platform developed by EsafeNet. Exploitation of this software in real-world attacks has been publicly documented twice to date. In January 2023, ESET documented an intrusion in which a gambling company in Hong Kong was compromised by a malicious update pushed by software in September 2022.

In late August of the same year, Symantec highlighted the activity of a new threat cluster codenamed Carderbee. The cluster was found to be using a trojanized version of a program that deploys PlugX, a backdoor widely used by Chinese hacker groups such as Mustang Panda. The attack targeted multiple organizations in Hong Kong and other Asian countries.

Speegle has not been identified to date. However, what makes this malware notable is that it is designed to collect and extract data only from systems that have Cobra DocGuard data protection software installed. This activity is tracked under the name “Runningcrab”.

“This likely indicates an intentional target to facilitate intelligence gathering or industrial espionage,” Broadcom’s threat hunting team said. “At this point, we believe the most likely hypothesis is that it was the work of state sponsors or private contractors.”

It is unclear exactly how the malware is delivered to victims, but it is suspected that it may have been done via supply chain attacks, as evidenced by the two cases mentioned above.

Additionally, it’s worth mentioning the central role played by security software and its infrastructure. In addition to using a legitimate Cobra DocGuard server as a command and control (C2) and data extraction point, Speagle also calls drivers associated with the program to remove itself from compromised hosts.

When launched, the 32-bit .NET executable first checks the Cobra DocGuard installation folder and progressively collects and sends data from the infected machine. This includes details about your system and files in specific folders, such as files containing web browser history and autofill data.

Additionally, Speagle variants were found to include additional functionality to turn on/off certain types of data collection and search for files related to Chinese ballistic missiles such as the Dongfeng-27 (also known as the DF-27).

“Speagle is a new parasitic threat that cleverly leverages Cobra DocGuard’s clients to hide its malicious activity and its infrastructure, hiding exfiltrated traffic,” the researchers wrote. “Its developers have undoubtedly noted previous supply chain attacks using this software and may have selected this software based on both its perceived vulnerabilities and high usage among targeted organizations.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous Article54 EDR killers use BYOVD to exploit 34 signed vulnerability drivers to disable security

Related Posts

54 EDR killers use BYOVD to exploit 34 signed vulnerability drivers to disable security

March 19, 2026

FortiGate RaaS, Citrix Exploits, MCP Abuse, LiveChat Phish & More

March 19, 2026

New Perseus Android banking malware monitors Notes app and extracts sensitive data

March 19, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Speagle malware hijacks Cobra DocGuard and steals data via compromised servers

54 EDR killers use BYOVD to exploit 34 signed vulnerability drivers to disable security

In the end Meta decided not to shut down Horizon Worlds on VR

FBI seizes website of pro-Iranian hacker group following devastating hack by Stryker

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.