Remember the Democratic National Committee email leak? Same hackers now targeting EU countries, say malware boffins

Researchers reckon they've cracked a Washington embassy and more


The hacker crew behind the US Democratic National Committee breach are still at it and have infiltrated an EU country's embassy in Washington DC, according to infosec biz ESET.

The Dukes, aka APT29 or Cozy Bear, were widely fingered as having been behind the infamous hack on the DNC, the governing body of the US opposition political party. Though the group seemed to have faded back into digital obscurity, ESET said today that they're still operating against EU countries.

ESET has identified three new malware families associated with the hacking crew, which it has named PolyglotDuke, RegDuke and FatDuke.

"One of the first public traces of this campaign can be found on Reddit in July 2014," said researcher Matthieu Faou. "We can confirm with high confidence that the same group is behind Operation Ghost Hunt and the DNC attack," he added.

ESET declined to name which countries had been infected, though it said that these were three EU countries and the US embassy of one of those nations.

APT29 has, so ESET says, used Twitter and Reddit to host its command-and-control URLs and also employs steganographic techniques. In Bratislava earlier this week the firm briefed El Reg on its findings, which are set out in full here, along with a white paper accessible from the link.

Concealed weapon

One intriguing technique seen by ESET was the use of steganography in images. In one example shown to us, a malware payload was hidden within image attribute metadata fields of an otherwise unaltered PNG file.

"We found strong code similarities between already documented samples and samples from Operation Ghost. We cannot discount the possibility of a false flag operation, however, this campaign started while only a small portion of the Dukes' arsenal was known. In 2013, at the first known compilation date of PolyglotDuke, only MiniDuke had been documented and threat analysts were not yet aware of the importance of this threat actor. Thus, we believe Operation Ghost was run simultaneously with the other campaigns and has flown under the radar until now," said the company in a statement.

Linked to Russian intelligence by just about everyone (except ESET, oddly), APT29 cracked the DNC's servers by using a SeaDaddy implant developed in Python and compiled with py2exe and another Powershell backdoor.

That was then deployed through a variety of remote access tools – and less sophisticated methods, as former US presidential hopeful Hilary Clinton's campaign manager, John Podesta, found out to his cost. ®

Similar topics


Other stories you might like

  • DigitalOcean sets sail for serverless seas with Functions feature
    Might be something for those who find AWS, Azure, GCP overly complex

    DigitalOcean dipped its toes in the serverless seas Tuesday with the launch of a Functions service it's positioning as a developer-friendly alternative to Amazon Web Services Lambda, Microsoft Azure Functions, and Google Cloud Functions.

    The platform enables developers to deploy blocks or snippets of code without concern for the underlying infrastructure, hence the name serverless. However, according to DigitalOcean Chief Product Officer Gabe Monroy, most serverless platforms are challenging to use and require developers to rewrite their apps for the new architecture. The ultimate goal being to structure, or restructure, an application into bits of code that only run when events occur, without having to provision servers and stand up and leave running a full stack.

    "Competing solutions are not doing a great job at meeting developers where they are with workloads that are already running today," Monroy told The Register.

    Continue reading
  • Patch now: Zoom chat messages can infect PCs, Macs, phones with malware
    Google Project Zero blows lid off bug involving that old chestnut: XML parsing

    Zoom has fixed a security flaw in its video-conferencing software that a miscreant could exploit with chat messages to potentially execute malicious code on a victim's device.

    The bug, tracked as CVE-2022-22787, received a CVSS severity score of 5.9 out of 10, making it a medium-severity vulnerability. It affects Zoom Client for Meetings running on Android, iOS, Linux, macOS and Windows systems before version 5.10.0, and users should download the latest version of the software to protect against this arbitrary remote-code-execution vulnerability.

    The upshot is that someone who can send you chat messages could cause your vulnerable Zoom client app to install malicious code, such as malware and spyware, from an arbitrary server. Exploiting this is a bit involved, so crooks may not jump on it, but you should still update your app.

    Continue reading
  • Google says it would release its photorealistic DALL-E 2 rival – but this AI is too prejudiced for you to use
    It has this weird habit of drawing stereotyped White people, team admit

    DALL·E 2 may have to cede its throne as the most impressive image-generating AI to Google, which has revealed its own text-to-image model called Imagen.

    Like OpenAI's DALL·E 2, Google's system outputs images of stuff based on written prompts from users. Ask it for a vulture flying off with a laptop in its claws and you'll perhaps get just that, all generated on the fly.

    A quick glance at Imagen's website shows off some of the pictures it's created (and Google has carefully curated), such as a blue jay perched on a pile of macarons, a robot couple enjoying wine in front of the Eiffel Tower, or Imagen's own name sprouting from a book. According to the team, "human raters exceedingly prefer Imagen over all other models in both image-text alignment and image fidelity," but they would say that, wouldn't they.

    Continue reading

Biting the hand that feeds IT © 1998–2022