Breaking News

ASUS Announces Turbo Radeon AI Pro R9700 32GB Graphics Card GIGABYTE Launches AORUS RTX 5060 Ti AI BOX eGPU LIAN LI Launches 8.8” Universal Screen with Flexible Mounting Solution Viltrox Announces Two New Affordable, Pocketable Ultra-Wide Autofocus Prime Lenses Logitech G Drops a Wide Array of New Products and Innovations at Logitech G PLAY 2025

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

F-Secure Identifies Malware Family Linked To Russian State-backed Cyber-espionage

F-Secure Identifies Malware Family Linked To Russian State-backed Cyber-espionage

Enterprise & IT Sep 17,2015 0

Security firn F-Secure has released a new whitepaper commonly referred to as "the Dukes" - a well-resourced, highly dedicated, and organized cyber-espionage group that has been working for the Russian government since at least 2008 to collect intelligence in support of foreign and security policy decision-making. The Dukes (sometimes also referred to as APT29) are known to employ a wide arsenal of malware toolsets including MiniDuke, CosmicDuke, OnionDuke, CozyDuke, SeaDuke, CloudDuke (aka MiniDionis), and HammerDuke.

The Dukes primarily target Western governments and related organizations, such as government ministries and agencies, political think tanks, and governmental subcontractors. Their targets have also included the governments of members of the Commonwealth of Independent States; Asian, African, and Middle Eastern governments; organizations associated with Chechen extremism; and Russian speakers engaged in the illicit trade of controlled substances and drugs.

According to the report, the Dukes have engaged in apparently biannual large-scale spear-phishing campaigns against hundreds or even thousands of recipients associated with governmental institutions and affiliated organizations. These campaigns utilize a smash-and-grab approach involving a fast but noisy break-in followed by the rapid collection and exfiltration of as much data as possible. If the compromised target is discovered to be of value, the Dukes will quickly switch the toolset used and move to using stealthier tactics focused on persistent compromise and long-term intelligence gathering.

In addition to these large-scale campaigns, the Dukes continuously and concurrently engage in smaller, much more targeted campaigns, utilizing different toolsets. These targeted campaigns have been going on for at least 7 years. The targets and timing of these campaigns appear to align with the known foreign and security policy interests of the Russian Federation at those times.

The Dukes rapidly react to research being published about their toolsets and operations. However, the group (or their sponsors) value their operations so highly that though they will attempt to modify their tools to evade detection and regain stealth, they will not cease operations to do so, but will instead incrementally modify their tools while continuing apparently as previously planned.

In some of the most extreme cases, the Dukes have been known to engage in
campaigns with unaltered versions of tools that only days earlier have been brought to the public’s attention by security companies and actively mentioned in the media. In doing so, the Dukes show unusual confidence in their ability to continue successfully compromising their targets even when their tools have been publicly exposed, as well as in their ability to operate with impunity.

Tags: malwareCyber Attack
Previous Post
PS4 Sales In China Limited by Local Censorship Rules
Next Post
Xbox 360 System Update Adds New Features

Related Posts

  • European Supercomputers Researching Covid-19 Report Hacking Attacks

  • Intel and Microsoft Convert Malware to Images to Spot Threads Faster

  • Texas Courts Faced a Ransomware Attack

  • GoDaddy Discloses Data Breach

  • Indonesia's Tokopedia Inverstigates Alleged Data Leak of 91 Million Users

  • Marriott Discloses New Data Breach

  • FireEye Warns About Chinese APT41 Global Intrusion Campaign Using Multiple Exploits

  • Malwarebytes Outlines Coronavirus Scams

Latest News

ASUS Announces Turbo Radeon AI Pro R9700 32GB Graphics Card
GPUs

ASUS Announces Turbo Radeon AI Pro R9700 32GB Graphics Card

GIGABYTE Launches AORUS RTX 5060 Ti AI BOX eGPU
GPUs

GIGABYTE Launches AORUS RTX 5060 Ti AI BOX eGPU

LIAN LI Launches 8.8” Universal Screen with Flexible Mounting Solution
Enterprise & IT

LIAN LI Launches 8.8” Universal Screen with Flexible Mounting Solution

Viltrox Announces Two New Affordable, Pocketable Ultra-Wide Autofocus Prime Lenses
Cameras

Viltrox Announces Two New Affordable, Pocketable Ultra-Wide Autofocus Prime Lenses

Logitech G Drops a Wide Array of New Products and Innovations at Logitech G PLAY 2025
Enterprise & IT

Logitech G Drops a Wide Array of New Products and Innovations at Logitech G PLAY 2025

Popular Reviews

be quiet! Dark Mount Keyboard

be quiet! Dark Mount Keyboard

Terramaster F8-SSD

Terramaster F8-SSD

be quiet! Light Mount Keyboard

be quiet! Light Mount Keyboard

be quiet! Light Base 600 LX

be quiet! Light Base 600 LX

Noctua NH-D15 G2

Noctua NH-D15 G2

be quiet! Pure Base 501

be quiet! Pure Base 501

Soundpeats Pop Clip

Soundpeats Pop Clip

Akaso 360 Action camera

Akaso 360 Action camera

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed