Network Security, Vulnerability Management, Endpoint/Device Security
Russian group exploits Windows print spooler bug via ‘GooseEgg’ malware

Authentication credential compromise likley with Xerox VersaLink printer flaw. (Adobe Stock)
Microsoft says a previously undocumented malware it calls "GooseEgg" is being used by Russian threat group APT28 to exploit a known Windows Print Spooler bug, leading to network compromise and credential theft.The software giant is urging organizations to patch the vulnerability, after observing the malware being deployed against targets in North America, Western Europe, and Ukraine.In an April 22 post, Microsoft Threat Intelligence researchers described GooseEgg as a simple launcher application that can enable remote code execution, backdoor installation and lateral movement.They said APT28 had used the tool since at least June 2020 (and possibly as early as April 2019) to exploit CVE-2022-38028, a print spooler bug Microsoft issued a patch for in October 2022. The threat group’s attack involved the hackers modifying a JavaScript constraints file in the printer spooler and executing it with SYSTEM-level permissions.“GooseEgg is typically deployed with a batch script, which we have observed using the name execute.bat and doit.bat,” the researchers said.“This batch script writes the file servtask.bat, which contains commands for saving off/compressing registry hives. The batch script invokes the paired GooseEgg executable and sets up persistence as a scheduled task designed to run servtask.bat.”
An In-Depth Guide to Network Security
Get essential knowledge and practical strategies to fortify your network security.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds