MiniDuke
Active
 
Backdoor
February 2013
 
Windows
2008
 
500-1,000
TOP TARGETED COUNTRIES:
Ukraine, Belgium, Portugal, Romania, The Czech Republic, Ireland, USA, Hungary
  • Social engineering
  • Cyberespionage
  • The malicious downloader is unique to each system and contains a customized backdoor written in Assembler.
  • The malware also uses Twitter, looking for specific tweets from pre-made accounts created by MiniDuke’s Command and Control (C2) operators. The tweets maintain encrypted URLs for the backdoors.
  • The infected system receives encrypted backdoors within GIF files and disguised as pictures that appear on a victim’s machine.
  • Government entities
  • Energy, oil and gas companies
  • Military
  • Academia/Research
  • Telecoms
  • Russian-speaking authors
The blog post and research paper are available at Securelist.com (blog post #1, blog post #2)