SpiceRAT: Cisco Talos Sound Alarm Over New Trojan

While the overall volume of trojan attacks may fluctuate, their potential impact remains severe
Remote Access Trojans are resurfacing, and Cisco Talos shows they are doing so with increased sophistication

Cisco Talos, a renowned cybersecurity intelligence group, has recently uncovered a sophisticated new trojan called SpiceRAT, raising concerns in the cybersecurity community. 

This remote access trojan (RAT) is the latest tool in the arsenal of a threat actor known as SneakyChef, targeting government agencies across Europe, the Middle East, Africa, and Asia.

SpiceRAT was discovered during Cisco Talos' investigation into a phishing campaign orchestrated by SneakyChef. 

The campaign utilised the same email address to distribute both SpiceRAT and another malware called SugarGh0st, indicating a coordinated attack strategy.

SpiceRAT’s strategy 

The infection process of SpiceRAT is particularly noteworthy for its complexity and stealth. Cisco Talos identified two primary infection chains: one using LNK files (Windows shortcuts) and another employing HTA files (HTML applications). 

Both methods involve multiple stages to deploy the trojan, demonstrating the attacker's sophistication.

In the LNK-based infection chain, victims receive a malicious RAR file containing a Windows shortcut file and a hidden folder. 

When executed, this shortcut triggers a series of events that ultimately lead to the installation of SpiceRAT. The HTA-based infection chain, on the other hand, uses a malicious HTA file to drop and execute a downloader, which then fetches and installs the SpiceRAT components.

Once installed, SpiceRAT exhibits advanced capabilities. It collects reconnaissance data from the victim's machine, including operating system details, hostname, username, and network information. 

This data is encrypted and stored in memory. The trojan then establishes communication with its command and control (C2) server, sending encrypted data and receiving further instructions or additional malicious payloads.

The discovery of SpiceRAT highlights the evolving landscape of trojan threats in the cybersecurity sector. 

Remote Trojan’s tactics

Trojans, like other forms of malware, have become increasingly sophisticated and difficult to detect, especially RATs due to the remote operation of them.

RATs is a type of malicious software that provides unauthorised remote access and control over a victim's computer or network. 

Once installed, typically through deceptive means such as phishing emails or malicious downloads, a RAT allows attackers to perform a wide range of actions on the compromised system. 

These actions may include accessing files, logging keystrokes, activating webcams or microphones, and executing commands. 

RATs are particularly dangerous because they often operate stealthily, evading detection by traditional security measures. 

They can serve as a backdoor for cybercriminals to conduct further attacks, steal sensitive information, or use the infected system as part of a larger botnet.

As of 2023, Trojan horses accounted for 58% of all malware attacks. 

Youtube Placeholder

Keeping the perimeter secure

The cybersecurity industry has made significant strides in developing advanced detection and prevention technologies.

Key developments include the use of AI and machine learning for real-time threat detection, zero trust Architecture, and cloud-native security measures. 

These innovations enable more effective identification and mitigation of evolving threats. 

However, the discovery of advanced malware like SpiceRAT underscores the ongoing need for continuous improvement in cybersecurity technologies and practices, as cybercriminals continue to innovate in response to enhanced security measures.

The use of legitimate applications for sideloading malicious DLLs, as seen in SpiceRAT's infection chain, is a growing trend that makes detection more challenging. 

Additionally, the modular nature of modern trojans, with their ability to download and execute additional payloads, increases their versatility and potential for causing harm.

While the overall volume of trojan attacks may fluctuate, their potential impact remains severe. 

As trojans continue to evolve, so too must defences. Only through constant vigilance and adaptation can they understand how attacks are getting in their perimeter and know when and what to let through. 


Make sure you check out the latest edition of Cyber Magazine and also sign up to our global conference series - Tech & AI LIVE 2024


Cyber Magazine is a BizClik brand


Featured Articles

UK Takes Steps to Strengthen Country's Cyber Security

The new government have made cybersecurity one of their top priorities as they lay out their plans for what they intend to do in power

BlueVoyant Launch Platform to Tackle Supplier Attack Surface

BlueVoyant has unveiled a new Cyber Defense Platform which aims to tackle the growing attack surface introduced by the ecosphere of third-party vendors

Irdeto’s Andrew Bunten Talks Securing Online Content Streams

With online streaming services being bigger than ever, Irdeto’s Andrew Bunten explains how they manage to keep streams safe despite the huge attack surface

Fortinet Cyber Survey Shows Global Scope of Skills Gap

Operational Security

What ChatGPT Passing an Ethical Hacking Exam Means for Cyber

Technology & AI

Learn How CTEM can Upskill Your Cyber Strategy

Network Security