Malicious PDF Giving Easy Access of your personal information to Cyber Criminals

F-Secure-logo

The backdoor known as “MiniDuke” was identified in Feburary 2013 by F-Secure Labs, discovered in a series of attacks against NATO and European government agencies. During MiniDuke Analysis it was determined that another malware family was using the same loader as MiniDuke stage 3. That malware is part of the Cosmu family of information-stealers which have been around for years.

The backdoor known as “MiniDuke” was identified in Feburary 2013 by F-Secure Labs, discovered in a series of attacks against NATO and European government agencies. During MiniDuke Analysis it was determined that another malware family was using the same loader as MiniDuke stage 3. That malware is part of the Cosmu family of information-stealers which have been around for years.

 

What makes the connection to MiniDuke interesting is that, based on compilation timestamps, it was Cosmu, not MiniDuke, which originally used the common shared loader. Moreover, it was found that the loader was updated at some point, and both malware families took the updated loader into use. Since Cosmu is the first malware known to share code with MiniDuke, it was decided to name the samples showing this amalgamation of MiniDuke-derived loader and Cosmu-derived payload as CosmicDuke.

 

The filenames and content used in CosmicDuke’s attack files to lure victims contain references to the countries of Ukraine, Poland, Turkey, and Russia, either generally in use of language or included detail, or in allusions to events or institutions. The filenames and content chosen seem to be tailored to their target’s interests, though we have no further information on the identity or location of these victims yet.

 

CosmicDuke infections start by tricking targets into opening either a PDF file which contains an exploit or a Windows executable whose filename is manipulated to make it look like a document or image file.

 

Once the target opens the file, the malware gains persistence on the system and starts collecting information. The data collection components include a keylogger, clipboard stealer, screenshotter, and password stealers for a variety of popular chat, e-mail and web browsing programs. CosmicDuke also collects information about the files on the system, and has the capability to export cryptographic certificates and the associated private keys.

Once the information has been collected, it is sent out to remote servers via FTP. In addition to stealing information from the system, CosmicDuke allows the attacker to download and execute other malware on the system.

Filed in: Computer Hardware, News, Security

Recent Posts

Bookmark and Promote!

© 2019 ItVoice | Online IT Magazine India. All rights reserved.
Powered by IT Voice