F-Secure has discovered MiniDuke malware samples in the wild

From Botnets.fr
Jump to navigation Jump to search

(Publication) Google search: [1]

F-Secure has discovered MiniDuke malware samples in the wild
Botnet MiniDuke
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2014 / 2014-04-02
Editor/Conference
Link http://securityaffairs.co/wordpress/23658/cyber-crime/f-secure-new-miniduke-atp.html (Archive copy)
Author Pierluigi Paganini
Type Blogpost

Abstract

Security Experts at F-Secure discovered a collection of pdf documents, that had references to Ukraine, containing MiniDuke malware samples.

MiniDuke is the name of a sophisticated cyber espionage campaign discovered more than one year ago by experts at Kaspersky Lab and Hungary’s Laboratory of Cryptography and System Security (CrySyS). The malicious code was used by unknown hackers to infect dozens of computers at government agencies across Europe exploiting a security flaw in Adobe software, the malicious Payload is dropped once the victim opens the malicious PDF file. The malware was designed to steal sensitive information from government organizations and high profile entities, the level of sophistication and the nature of the chosen targets suggest that the attacks are part of a state-sponsored espionage campaign.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2014BFR1381,
   editor = {},
   author = {Pierluigi Paganini},
   title = {F-Secure has discovered MiniDuke malware samples in the wild},
   date = {02},
   month = Apr,
   year = {2014},
   howpublished = {\url{http://securityaffairs.co/wordpress/23658/cyber-crime/f-secure-new-miniduke-atp.html}},
 }