Industrial Cybersecurity Pulse
  • SUBSCRIBE
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
SUBSCRIBE
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
Industrial Cybersecurity Pulse
Subscribe
Industrial Cybersecurity Pulse
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Threats & Vulnerabilities

Throwback Attack: MiniDuke malware attacks 23 countries

  • Christina Miller
  • June 3, 2022
A hacker in the background.
Courtesy: CFE Media and Technology
Total
0
Shares
0
0
0
0

While governments and organizations are attacked daily, some attacks leave little, if any, damage. It really depends on the sophistication level of the threat actor, which varies with each hack. However, there can be a lot learned from the level of sophistication an attack brings with it. For instance, in 2013, hackers attacked European governments using a malware called ‘MiniDuke.’

MiniDuke malware was used to target 23 countries worldwide, exploiting a flaw in Adobe software. The North Atlantic Treaty Organization (NATO) was one of the organizations attacked with MiniDuke, but it was not compromised in the end.

“This is a unique, fresh and very different type of attack,” said Kurt Baumgartner, a senior security researcher with Kaspersky Lab, according to an article from CNBC. “The technical indicators show this is a new type of threat actor that hasn’t been reported on before.”

MiniDuke malware explained

Security firm FireEye had found security bugs in Adobe’s Reader and Acrobat software two weeks before the MiniDuke campaign had started. Then, FireEye reported that hackers were infecting systems by circulating PDFs tainted with malicious software, a common strategy. The attackers in this situation combined old malware writing tactics with the recently discovered vulnerabilities in Adobe Reader to collect geopolitical intelligence from their targets.

The PDFs were comprised of fake Asia-Europe Meeting (ASEM) human rights seminar information, Ukraine’s foreign policy and NATO membership plans. However, what they really contained were exploits attacking certain versions of Adobe Reader, bypassing its sandbox, which is a security mechanism that separates running programs to mitigate software vulnerabilities from spreading.

Once a system was accessed, a downloader was dropped onto the victim’s desktop that had a customized backdoor. A cybersecurity expert, Boldizsar Bencsath, thought that the backdoors were installed in organizations that the hackers were interested in, so they could continue to take information they came across in the future.

According to a Reuters article, the MiniDuke attackers’ approach to communicate with infected machines was unique. “The virus was programmed to search for Tweets from specific Twitter accounts that contained instructions for controlling those personal computers. In cases where they could not access those Tweets, the virus ran Google searches to receive its marching orders.”

The premade tweets had specific tags labeling encrypted URLs for the backdoors and held access to the C2s, which then provided potential commands and encrypted transfers of additional backdoors onto the system through GIF files disguised as pictures. Once the pictures were downloaded onto the system, the attacker could carry out basic actions and execute new malware.

Details of the attack

MiniDuke struck at more than 20 countries, hitting 59 unique victims. According to Kaspersky Lab’s analysis, “a number of high-profile targets have already been compromised by the MiniDuke attacks, including government entities in Ukraine, Belgium, Portugal, Romania, the Czech Republic and Ireland. In addition, a research institute, two think tanks and a health care provider in the United States were also compromised, as was a prominent research foundation in Hungary.”

Russia’s Kaspersky Lab and Hungary’s Laboratory of Cryptography and System Security (CrySyS) said that MiniDuke was designed for espionage, but researchers are still trying to figure out the attacks’ ultimate goal. Due to the the attacks’ sophistication and high-profile targets, experts suspected that a nation-state was behind them. CrySys identified servers in Panama, France, Switzerland, Germany and the U.S. as the source of the code; however, further examination of the code didn’t reveal any more information about its origin.

MiniDuke evolution

The combination of techniques used in the MiniDuke attacks stuck out to cybersecurity experts. For example, Eugene Kaspersky, founder and CEO of Kaspersky Lab said, “I remember this style of malicious programming from the end of the 1990s and the beginning of the 2000s. I wonder if these types of malware writers, who have been in hibernation for more than a decade, have suddenly awoken and joined the sophisticated group of threat actors active in the cyberworld.”

Old-school threat actors were able to create complex viruses. The people behind MiniDuke were able to use the same complexity as the old threat actors and add clever social engineering at high-profile organizations, making them very dangerous. MiniDuke may have stopped its campaign or decreased its intensity to stay off the radar for a while, but the threat didn’t stay quiet for long.

Since 2013, there have been many variations of MiniDuke that have sprung up, such as CozyDuke and CosmicDuke, just to name a few. In 2014, CozyDuke targeted the White House and the U.S. Department of State, and CosmicDuke, which also targeted important organizations, was deemed the “new” MiniDuke.

Where one malware or threat actors falls off, more will come out to take its place. Though malware threats and ransomware are still on the rise, it is important to stay vigilant and mitigate any vulnerabilities as they come.

Do you have experience and expertise with the topics mentioned in this article? You should consider contributing content to our CFE Media editorial team and getting the recognition you and your company deserve. Click here to start this process.

Christina Miller

Christina Miller is the assistant content editor at CFE Media and Technology.

Related Topics
  • CFE Content
  • Featured
  • news
Previous Article
  • Threats & Vulnerabilities

Throwback Attack: Hackers attempt to flood Israeli water supply with chlorine

  • Tyler Wall
  • May 26, 2022
Read More
Next Article
Courtesy: CFE Media
  • Threats & Vulnerabilities

IST’s Ransomware Task Force seeks to remedy ransomware attacks

  • Tyler Wall
  • June 6, 2022
Read More
You May Also Like
Read More

How a desert water utility helped protect critical infrastructure

A robot powered by OSARO’s machine learning system picks consumer goods. Courtesy: A3/OSARO
Read More

Industrial robot utilization requires cybersecurity strategy

Courtesy: Brett Sayles
Read More

Throwback attack: Russia launches its first cyberattack on the U.S. with Moonlight Maze

Read More

Throwback attack: Russia breaches Wolf Creek Nuclear Power facility

Courtesy: CFE Media and Technology
Read More

Lack of qualified cybersecurity personnel for critical infrastructure

Figure 1: PLCs, HMIs, and other Ethernet-capable automation devices used for modern automation systems can no longer rely on “cybersecurity by obscurity” and “air gaps.” They must progressively adopt advanced IT type security features. Courtesy: AutomationDirect
Read More

Cybersecurity-centered systems and fundamentals

Read More

Port and maritime cybersecurity vulnerabilities are getting more focus

Figure 1: For smaller organizations with limited network resources, it can be tempting to plug your machine directly into the business network. Courtesy: DMC
Read More

Securing your facility

SUBSCRIBE

GET ON THE BEAT

Keep your finger on the pulse of top industry news

SUBSCRIBE TODAY!
VULNERABILITY PULSE
  • Mitsubishi Electric - June 14, 2022
  • Meridian Cooperative - June 14, 2022
  • Johnson Controls - June 14, 2022
  • Microsoft - June 14, 2022
  • Citrix - June 14, 2022

RECENT NEWS

  • Protecting the power grid through cyber-physical threat response
  • How to secure Industry 4.0 in a highly connected world
  • Managing external connections to your operational technology (OT) environment
  • Webcast: Addressing Cybersecurity Challenges in Industry 4.0
  • How a desert water utility helped protect critical infrastructure

EDUCATION BEAT

Introduction to Cybersecurity within Cyber-Physical Systems

Cyber-physical systems serve as the foundation and the invention base of the modern society making them critical to both government and business.

REGISTER NOW!
HACKS & ATTACKS
  • Ron Brash Interview: Expert advice on finding the root of the ransomware problem
  • Throwback Attack: How the modest Bowman Avenue Dam became the target of Iranian hackers
  • Minimizing the REvil impact delivered via Kaseya servers
  • Key takeaways from 2020 ICS-CERT vulnerabilities
Industrial Cybersecurity Pulse

Copyright 2022 CFE Media and Technology.
All rights reserved.


BETA

Version 1.0

  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions

Input your search keywords and press Enter.

By using this website, you agree to our use of cookies. This may include personalization of content and ads, and traffic analytics. Review our Privacy Policy for more information. ACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT