Cobra

Malware Profile Updated 3 months ago
Download STIX
Preview STIX
Cobra is a type of malware, short for malicious software, designed to exploit and damage computer systems or devices. It can infiltrate systems through suspicious downloads, emails, or websites, often unbeknownst to the user. Once inside, Cobra has the potential to steal personal information, disrupt operations, or even hold data hostage for ransom. In 2022, the Financial Transactions and Reports Analysis Centre (FINTRAC) reported its involvement in assisting Alberta police with Project Cobra. This project resulted in the seizure of significant quantities of illegal drugs, including 928 kg of methamphetamine and 6 kg of cocaine, demonstrating the wide-ranging impacts of this malicious software beyond just cyber threats. More recently, UK ministers held an emergency meeting of the Cobra committee due to concerns that the conflict between Israel and Hamas could potentially lead to a domestic terrorist incident. The Home Secretary, Suella Braverman, met with national security officials and police at No 10 to assess the security risk following a deadly attack by Hamas. These events underscore the serious implications of the Cobra malware, both in terms of cybersecurity and broader national security concerns.
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at.
IDVotesProfile Description
Cobra Docguard
3
Cobra DocGuard, a software produced by Chinese firm EsafeNet for protecting, encrypting, and decrypting software, has been exploited in a series of malware attacks. The attackers compromised the software's update files to deliver malicious updates that infected targeted systems. The first known inst
Chargeweapon
1
ChargeWeapon is a malicious software (malware) that exploits compromised web servers to gain unauthorized access and gather sensitive data from infected systems. The malware was first identified on the Cobra DocGuard web server, where it was deployed as a previously unknown Go-based backdoor. This b
FALLCHILL
1
FALLCHILL is a malicious software (malware) typically introduced into a system as a file dropped by other HIDDEN COBRA malware. It has been linked to the North Korea-associated Lazarus APT group, who notably utilized a MacOS variant of the malware for the first time. The cybersecurity company that r
Carbon System
1
The Carbon System is a sophisticated malware program, designed to exploit and damage targeted computer systems. It is part of a suite of cyber-espionage tools developed by the Turla attackers, known for their advanced capabilities and stealth. The malware infiltrates unsuspecting systems through sus
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Malware
Backdoor
Symantec
Encryption
Encrypt
Apt
Exploit
Windows
Police
Phishing
Botnet
exploitation
Chrome
Chinese
Linux
Uk
India
Espionage
Ddos
Wiper
Payload
Worm
Dropper
Ransomware
Associated Malware
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
KorplugUnspecified
2
Korplug, also known as PlugX, is a type of malware developed and utilized by the China-aligned Advanced Persistent Threat (APT) group, Mustang Panda. This malicious software is designed to infiltrate computer systems without detection, often through suspicious downloads, emails, or websites. Once in
VolgmerUnspecified
1
Volgmer is a backdoor Trojan malware, designed to provide covert access to a compromised system. Developed by the Lazarus Group, it has been used as a conduit for serving backdoors to control infected systems. This malware has been observed in 32-bit form as either executables or dynamic-link librar
PlugXUnspecified
1
PlugX is a notorious malware, typically associated with Chinese threat actors, that has been used in various cyberattacks. This malicious software infiltrates systems through suspicious downloads, emails, or websites and can steal personal information, disrupt operations, or hold data for ransom. It
Associated Threat Actors
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
CarderbeeUnspecified
3
Carderbee, a previously unknown Advanced Persistent Threat (APT) group, has been identified as the perpetrator behind a series of supply chain attacks against organizations in Hong Kong and other regions in Asia. The Symantec Threat Hunter Team reported that Carderbee used a malware-infused version
Emissary PandaUnspecified
2
Emissary Panda, also known as Iron Tiger, APT27, Budworm, Bronze Union, Lucky Mouse, and Red Phoenix, is a threat actor group associated with malicious cyber activities. The group has been active since at least 2013, targeting various industry verticals across Europe, North and South America, Africa
LuckyMouseUnspecified
2
LuckyMouse, also known as Budworm, Emissary Panda, and APT27, is a threat actor that has been involved in several high-profile cyber-espionage activities. The group has demonstrated its ability to develop and deploy advanced cyber tools, targeting various operating systems including MacOS, Linux, an
APT27Unspecified
2
APT27, also known as Iron Taurus, is a Chinese threat actor group that primarily engages in cyber operations with the goal of intellectual property theft. The group targets multiple organizations worldwide, including those in North and South America, Europe, and the Middle East. APT27 utilizes vario
HIDDEN COBRAUnspecified
2
Hidden Cobra, also known as the Lazarus Group and Sapphire Sleet, is a North Korean cyberespionage group that has been active since at least 2009. The U.S. Government uses the term Hidden Cobra to refer to malicious cyber activities by the North Korean government, with the BeagleBoyz representing a
TurlaUnspecified
1
Turla, also known as Pensive Ursa, is a sophisticated threat actor linked to Russia that has been active for many years. The group is known for its advanced cyber-espionage capabilities and has been associated with numerous high-profile breaches. According to the MITRE ATT&CK and MITRE Ingenuity dat
BudwormUnspecified
1
Budworm, also known as LuckyMouse or APT 27, is a threat actor that has been associated with various high-profile cyber attacks. This group has been found to utilize tools such as the Korplug backdoor, which is commonly used by multiple Advanced Persistent Threats (APTs) including Budworm and APT41,
BRONZE UNIONUnspecified
1
Bronze Union, also known as APT27, Emissary Panda, Lucky Mouse, Iron Tiger, and Red Phoenix, is a threat actor with alleged connections to the Chinese government. The group has been observed targeting organizations across Europe, North and South America, Africa, the Middle East, and the Asia-Pacific
Associated Vulnerabilities
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
Korplug/plugxUnspecified
1
None
Source Document References
Information about the Cobra Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
SourceCreatedAtTitle
CERT-EU
5 months ago
Canada’s anti-money laundering agency hit by a cyber attack | IT World Canada News
CERT-EU
8 months ago
Indian government’s ‘high risk’ warning for Google users, you maybe under attack
CERT-EU
8 months ago
Plan to tighten law on glorifying terrorism ‘could criminalise crowd at Murrayfield’ - Security news - NewsLocker
CERT-EU
9 months ago
No 10 says 40% of trains must always run under news laws to limit impact of strikes – UK politics live - Security news - NewsLocker
CERT-EU
9 months ago
Cabinet minister refuses to back Suella Braverman’s claim homelessness is ‘lifestyle choice’ – UK politics live - Security news - NewsLocker
CERT-EU
9 months ago
Revealed: plan to brand anyone ‘undermining’ UK as extremist - Security news - NewsLocker
CERT-EU
9 months ago
Counter-terror chiefs on alert for Iranian activity in UK exploiting Gaza war - Security news - NewsLocker
CERT-EU
9 months ago
Man jailed for life for attempted murder of US woman stationed at GCHQ - Security news - NewsLocker
CERT-EU
9 months ago
Man, 28, who brought bomb to Leeds hospital was self-radicalised, court told - Security news - NewsLocker
CERT-EU
9 months ago
UK ministers to hold Cobra meeting on terrorism threat from Israel-Hamas conflict - Security news - NewsLocker
CERT-EU
10 months ago
Chinese Hackers Attacking Semiconductor Industries using Cobalt Strike beacon
CERT-EU
10 months ago
Chinese State-Sponsored Cyber Espionage Activity Targeting Semiconductor Industry in East Asia
CERT-EU
a year ago
Cyber Security Week in Review: August 25, 2023
CERT-EU
a year ago
Years into these games’ histories, attackers are still creating “Fortnite” and “Roblox”-related scams
CERT-EU
a year ago
The Week in Security: WinRAR exploit targets traders, malicious npm packages go after game devs
BankInfoSecurity
a year ago
Threat Actor Targets Hong Kong With Korplug Backdoor
CERT-EU
a year ago
Novel Carderbee supply chain attack impacts Asian organizations
CERT-EU
a year ago
Carderbee Hacking Group Uses Legitimate Software in Supply Chain Attack
Securityaffairs
a year ago
Carderbee APT targets Hong Kong orgs via supply chain attacks
CERT-EU
a year ago
Carderbee: APT Group use Legit Software in Supply Chain Attack Targeting Orgs in Hong Kong