F-Secure has discovered MiniDuke malware samples in the wild
(Publication) Google search: [1]
F-Secure has discovered MiniDuke malware samples in the wild | |
---|---|
Botnet | MiniDuke |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2014 / 2014-04-02 |
Editor/Conference | |
Link | http://securityaffairs.co/wordpress/23658/cyber-crime/f-secure-new-miniduke-atp.html (Archive copy) |
Author | Pierluigi Paganini |
Type | Blogpost |
Abstract
“ Security Experts at F-Secure discovered a collection of pdf documents, that had references to Ukraine, containing MiniDuke malware samples.
MiniDuke is the name of a sophisticated cyber espionage campaign discovered more than one year ago by experts at Kaspersky Lab and Hungary’s Laboratory of Cryptography and System Security (CrySyS). The malicious code was used by unknown hackers to infect dozens of computers at government agencies across Europe exploiting a security flaw in Adobe software, the malicious Payload is dropped once the victim opens the malicious PDF file. The malware was designed to steal sensitive information from government organizations and high profile entities, the level of sophistication and the nature of the chosen targets suggest that the attacks are part of a state-sponsored espionage campaign.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2014BFR1381, editor = {}, author = {Pierluigi Paganini}, title = {F-Secure has discovered MiniDuke malware samples in the wild}, date = {02}, month = Apr, year = {2014}, howpublished = {\url{http://securityaffairs.co/wordpress/23658/cyber-crime/f-secure-new-miniduke-atp.html}}, }