Miniduke attackers build new malware for attacking governments, military, defense contractors and energy sector The Miniduke advanced persistent threat (APT) campaign that has been dormant for more than a year is back with more data-stealing tools and better defenses against prying security researchers.[The processes and tools behind a true APT campaign: Overview]Miniduke went nearly dark after February 2013, which is when Kaspersky Lab and CrySys Lab first publicized the campaign targeting mostly government organizations in Europe.Oddly, while still going after the same groups, the attackers behind the campaign have added spying on online traffickers in illegal substances, such as hormones and steroids. The new Miniduke uses a custom backdoor that combines the code of the original malware with that of the Cosmu family of information-stealers, which has been around at least since 2001.Dubbed CosmicDuke, the new malware uses the MiniDuke-derived loader and the Cosmu-derived payload. Anti-virus vendor F-Secure was the first to discover and name CosmicDuke. The backdoor is compiled using a customizable framework called BotGenStudio, which has the flexibility to enable or disable components when the compromised PC is turned into a bot.Each infected system is assigned a unique identifier, making it possible for the attackers to push updates specific to an individual victim, Kaspersky said in its SecureList blog.The malware is designed to steal a variety of files based on extensions and file name keywords. The backdoor has about 20 capabilities that include stealing Skype, Google Chrome, Google Talk, Opera, Firefox and Thunderbird passwords.CosmicDuke can also take screen images every five minutes, grab content from the clipboard every 30 seconds and export certificates and private keys.The malware uses an unusual method of storing stolen data. It breaks up a file into small, 3 KB chunks that are compressed, encrypted and placed in a container for uploading to a command and control server, Kaspersky said.If the file is large enough, it can be broken up into several hundred containers that are uploaded independently. The data pieces are likely parsed, decrypted, unpacked and reassembled on the attackers’ side. “Creating such a complicated storage might be an overhead; however, all those layers of additional processing guarantees that very few researchers will get to the original data while offering an increased reliability against network errors,” Kaspersky said.Systems infected with CosmicDuke and the older Miniduke malware, which the attackers still used, were in government, the energy sector, the military and the defense industry.[Why you need to embrace the evolution of APT]Also affected were individuals involved in the trafficking of illegal and controlled substances. These victims were only in Russia. Countries with victims in the government category included Australia, Belgium, France, Germany, Hungary, Netherlands, Spain, Ukraine and the United States. Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe