SpiceRAT: Cisco Talos Sound Alarm Over New Trojan

Share
While the overall volume of trojan attacks may fluctuate, their potential impact remains severe
Remote Access Trojans are resurfacing, and Cisco Talos shows they are doing so with increased sophistication

Cisco Talos, a renowned cybersecurity intelligence group, has recently uncovered a sophisticated new trojan called SpiceRAT, raising concerns in the cybersecurity community. 

This remote access trojan (RAT) is the latest tool in the arsenal of a threat actor known as SneakyChef, targeting government agencies across Europe, the Middle East, Africa, and Asia.

SpiceRAT was discovered during Cisco Talos' investigation into a phishing campaign orchestrated by SneakyChef. 

The campaign utilised the same email address to distribute both SpiceRAT and another malware called SugarGh0st, indicating a coordinated attack strategy.

SpiceRAT’s strategy 

The infection process of SpiceRAT is particularly noteworthy for its complexity and stealth. Cisco Talos identified two primary infection chains: one using LNK files (Windows shortcuts) and another employing HTA files (HTML applications). 

Both methods involve multiple stages to deploy the trojan, demonstrating the attacker's sophistication.

In the LNK-based infection chain, victims receive a malicious RAR file containing a Windows shortcut file and a hidden folder. 

When executed, this shortcut triggers a series of events that ultimately lead to the installation of SpiceRAT. The HTA-based infection chain, on the other hand, uses a malicious HTA file to drop and execute a downloader, which then fetches and installs the SpiceRAT components.

Once installed, SpiceRAT exhibits advanced capabilities. It collects reconnaissance data from the victim's machine, including operating system details, hostname, username, and network information. 

This data is encrypted and stored in memory. The trojan then establishes communication with its command and control (C2) server, sending encrypted data and receiving further instructions or additional malicious payloads.

The discovery of SpiceRAT highlights the evolving landscape of trojan threats in the cybersecurity sector. 

Remote Trojan’s tactics

Trojans, like other forms of malware, have become increasingly sophisticated and difficult to detect, especially RATs due to the remote operation of them.

RATs is a type of malicious software that provides unauthorised remote access and control over a victim's computer or network. 

Once installed, typically through deceptive means such as phishing emails or malicious downloads, a RAT allows attackers to perform a wide range of actions on the compromised system. 

These actions may include accessing files, logging keystrokes, activating webcams or microphones, and executing commands. 

RATs are particularly dangerous because they often operate stealthily, evading detection by traditional security measures. 

They can serve as a backdoor for cybercriminals to conduct further attacks, steal sensitive information, or use the infected system as part of a larger botnet.

As of 2023, Trojan horses accounted for 58% of all malware attacks. 

Youtube Placeholder

Keeping the perimeter secure

The cybersecurity industry has made significant strides in developing advanced detection and prevention technologies.

Key developments include the use of AI and machine learning for real-time threat detection, zero trust Architecture, and cloud-native security measures. 

These innovations enable more effective identification and mitigation of evolving threats. 

However, the discovery of advanced malware like SpiceRAT underscores the ongoing need for continuous improvement in cybersecurity technologies and practices, as cybercriminals continue to innovate in response to enhanced security measures.

The use of legitimate applications for sideloading malicious DLLs, as seen in SpiceRAT's infection chain, is a growing trend that makes detection more challenging. 

Additionally, the modular nature of modern trojans, with their ability to download and execute additional payloads, increases their versatility and potential for causing harm.

While the overall volume of trojan attacks may fluctuate, their potential impact remains severe. 

As trojans continue to evolve, so too must defences. Only through constant vigilance and adaptation can they understand how attacks are getting in their perimeter and know when and what to let through. 

******

Make sure you check out the latest edition of Cyber Magazine and also sign up to our global conference series - Tech & AI LIVE 2024

******

Cyber Magazine is a BizClik brand

Share

Featured Articles

Cloudflare and the Push for E2E Encryption of Messaging Apps

Cloudflare has partnered with Whatsapp to deliver E2EE and Key Transparency for millions of users

Why Biden Was Proved Right on Push to Secure Water Utilities

The outgoing President has seen the threats posed by cyber attacks on specific utilise like water and has thus been pushing for tighter regulations

AI-Native Edge: Juniper Networks Vision of Networking

Juniper Network is aiming to offer visibility across network and security operations with its new Secure AI-Native Edge solution

DNV & CyberOwl Join to Give Shipping Huge Cyber Offering

Operational Security

Why is Active Directory a Concern for CISOs?

Cyber Security

Palo Alto Networks, Deloitte and The Push to Platformization

Cyber Security