Breaking News

DJI Brings World First to the Sky with Mini 5 Pro GAMEMAX introduces N90 case with LED DOT Matrix Display and Wood Aesthetics HighPoint Upgrades RocketStor 8000 Series eGPU Enclosures with 850W PSU and Smart Cooling Solution for Gen5 GPUs AMD Introduces EPYC Embedded 4005 Processors for Low-Latency Applications at the Edge ADATA Launches SD820 and SC735 External Solid-State Drives

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

Cyber Attack Targets Nato, Government Websites

Cyber Attack Targets Nato, Government Websites

Enterprise & IT Feb 27,2013 0

Security researchers have identified an ongoing cyber-espionage campaign that compromised computers belonging to government organizations, research institutes. The unknown malware exploits an exploited a 0-day vulnerability in Adobe Reader and was named 'Miniduke' by Kaspersky Labs and CrySyS Lab, who discovered the new threat. Adobe said a software patch issued last week should protect users from "MiniDuke" providing they downloaded it.

To compromise the victims, the attackers used effective social engineering techniques which involved sending malicious PDF documents to their targets. According to Kaspersky Labs, the PDFs were highly relevant and well-crafted content that fabricated human rights seminar information (ASEM) and Ukraine's foreign policy and NATO membership plans. These malicious PDF files were rigged with exploits attacking Adobe Reader versions 9, 10 and 11, bypassing its sandbox.

Here is how it works: Once the system is exploited, a very small downloader is dropped onto the victim's hard disk. This downloader is unique per system and contains a customized backdoor written in Assembler. When loaded at system boot, the downloader uses a set of mathematical calculations to determine the computer's unique fingerprint, and in turn uses this data to uniquely encrypt its communications later.

If the target system meets the pre-defined requirements, the malware will use Twitter and start looking for specific tweets from pre-made accounts. These accounts were created by MiniDuke?s Command and Control (C2) operators and the tweets maintain specific tags labeling encrypted URLs for the backdoors.

These URLs provide access to the C2s, which then provide potential commands and encrypted transfers of additional backdoors onto the system via GIF files.

Once the infected system locates the C2, it receives encrypted backdoors that are obfuscated within GIF files and disguised as pictures that appear on a victim's machine.

Once they are downloaded to the machine, they can fetch a larger backdoor which carries out the cyberespionage activities, through functions such as copy file, move file, remove file, make directory, kill process and of course, download and execute new malware and lateral movement tools.

The final stage backdoor connects to two servers, one in Panama and one in Turkey to receive the instructions from the attackers.

By analysing the logs from the command servers, researchers at Kaspersky Labs have observed 59 unique victims in 23 countries:

Belgium, Brazil, Bulgaria, Czech Republic, Georgia, Germany, Hungary, Ireland, Israel, Japan, Latvia, Lebanon, Lithuania, Montenegro, Portugal, Romania, Russian Federation, Slovenia, Spain, Turkey, Ukraine, United Kingdom and United States.

Nato has not officially confirmed its servers were attacked. The security researchers also declined to further elaborate on the targets' identities.

Tags: Virusmalware
Previous Post
Sony To Sell Tokyo Office Building for $1.2 Billion
Next Post
Freescale Introduces The World's Smallest ARM Microcontroller

Related Posts

  • Intel and Microsoft Convert Malware to Images to Spot Threads Faster

  • Malwarebytes Outlines Coronavirus Scams

  • Google's AI Tool Scans Billions of Gmail Attachments to Secure Inboxes

  • Pentagon, DHS And FBI Issued New Malware Warning For Windows Users

  • Lazarus Group Targets Linux With New Malware

  • Hackers Targeted Government Officials Using WhatsApp Malware

  • Malware Masked as Textbooks and Essays

  • Samsung Laptop Full of Notorious Malware Is On Sale For $1.2M

Latest News

DJI Brings World First to the Sky with Mini 5 Pro
Drones

DJI Brings World First to the Sky with Mini 5 Pro

GAMEMAX introduces N90 case with LED DOT Matrix Display and Wood Aesthetics
Cooling Systems

GAMEMAX introduces N90 case with LED DOT Matrix Display and Wood Aesthetics

HighPoint Upgrades RocketStor 8000 Series eGPU Enclosures with 850W PSU and Smart Cooling Solution for Gen5 GPUs
Enterprise & IT

HighPoint Upgrades RocketStor 8000 Series eGPU Enclosures with 850W PSU and Smart Cooling Solution for Gen5 GPUs

AMD Introduces EPYC Embedded 4005 Processors for Low-Latency Applications at the Edge
Enterprise & IT

AMD Introduces EPYC Embedded 4005 Processors for Low-Latency Applications at the Edge

ADATA Launches SD820 and SC735 External Solid-State Drives
PC components

ADATA Launches SD820 and SC735 External Solid-State Drives

Popular Reviews

be quiet! Dark Mount Keyboard

be quiet! Dark Mount Keyboard

Terramaster F8-SSD

Terramaster F8-SSD

be quiet! Light Mount Keyboard

be quiet! Light Mount Keyboard

be quiet! Light Base 600 LX

be quiet! Light Base 600 LX

Noctua NH-D15 G2

Noctua NH-D15 G2

Soundpeats Pop Clip

Soundpeats Pop Clip

be quiet! Pure Base 501

be quiet! Pure Base 501

Akaso 360 Action camera

Akaso 360 Action camera

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed