No Monkeys for CozyDuke

Yet another Duke APT is hitting high-profile targets, including the US government office. This time it’s CozyDuke (also known as CozyBear, CozyCar or “Office Monkeys”,  in honour of the video it employs as a decoy).

Yet another Duke APT is hitting high-profile targets, including the US government office. This time it’s CozyDuke (also known as CozyBear, CozyCar or “Office Monkeys”,  in honour of the video it employs as a decoy).

The attack is notably sophisticated, including encrypted components, anti-detection capabilities and a fairly well developed set of malware components that feature structural similarities with earlier MiniDuke, CosmicDuke and Onion Duke threats.

Office Monkeys are Dangerous

But, what really is worth mentioning – and, unfortunately, is quite a successful approach for many a targeted attack – is that this attack’s initial penetration method is based entirely on social engineering techniques. The attackers are offering an extremely funny video about office-working apes as bait. The archive, including an executable video, is delivered via spear-phishing emails containing an attachment or a link to a website (sometimes a legitimate and even highly-rated site that has already been compromised).

While the video plays, the attack’s dropper is silently installed into the system, ready to receive commands and second stage malware components from the Command & Control servers.

The cybercriminals were not mistaken in thinking that most of those targeted would launch the video. Not only have they launched it; they’ve shared it with office colleagues, thus actively assisting in the malware distribution process. Given the high profile of the targets, the amount of sensitive information that could potentially be stolen can only be guessed at.

So the question is: how do you mitigate such a horrific threat, when even your own trusted employees are working against your carefully built security? And, yes, you shouldn’t underestimate the power of social engineering: how many loyal employees would, for example, resist opening a link in a (carefully forged) letter from their boss?

Don’t Let It Reign!

How To Mitigate An Office Monkey Threat

Actually, several very basic security precautions or Mitigation Strategies can work effectively against even the most sophisticated and thoroughly planned APTs. For example, a simple curbing of administrative rights plus the timely patching of vulnerabilities and restricting the number of permitted apps can mitigate up to 85% of targeted attack-connected incidents.[1]

Kaspersky lab’s Application Control[2] would be a valuable asset here; the Monkey video – as well as the other malware components of CozyDuke – would simply not be able to launch without being previously approved by a system administrator.  Some administrative staff may have a limited range of duties and responsibilities, while dealing on a day to day basis with highly sensitive correspondence. Such a working scenario may be best addressed through adopting a Default Deny Applications Control mode, strictly limiting allowed executables to those system components and programs absolutely necessary to the individual’s work activities.

Other useful strategies, especially appropriate to government agencies or other highly regulated enterprises, may include:

  • using Web Control[3] technology to restrict access only to permitted web resources, limited to those that are work-related – or at least only to certain site categories.
  • applying e-mail content filtering, as offered by Kaspersky Security for Exchange / Linux Mail, to rule out suspicious emails and attachments (such as archives), perhaps depending on the recipient’s role and seniority.
  • using Device Control[4] technology to avoid unsolicited transfers of information through the security perimeter to and from the outside world – or even within the perimeter. As well as helping prevent the spread of malware, this approach can offer protection against some forms of intentional data theft
  • conducting specialized security training for employees, such as that offered by Kaspersky Lab as part of the Security Intelligence Services. This will drive increased awareness and understanding of the dangers they face, even while sitting in their well-guarded offices. It also educates them on how to avoid many seemingly innocent, yet unsafe practices that could cost their business a fortune – or even constitute a threat to their country’s security.

Find out more about counter-APT mitigation strategies on the Enterprise IT Security Section of our web-site.

Consider Something Bigger

Prior to an attack, APT actors will reconnoiter the targeted organization – including employee personas, business processes and current security solution specifics. This knowledge is used to help assess the target’s vulnerabilities and to sidestep existing security mechanisms.

So, when dealing with APTs, it is absolutely necessary to employ a multi-layered security approach, augmenting your trusted anti-malware [5] with a number of proactive security measures covering different parts of your IT network. Thus armed and prepared, you become a formidably unattractive and unviable target for APTs.

[1] Read the ‘Future Risks: Be Prepared’ – A Mitigation Strategies Special Report

[2] Available in Kaspersky Endpoint Security for Business (tiers Select and Avanced), Kaspersky Total Security and Kaspersky Security for Virtualization

[3] Available in Kaspersky Endpoint Security for Business (tiers Select and Avanced), Kaspersky Total Security and Kaspersky Security for Virtualization

[4] Available in Kaspersky Endpoint Security for Business (tiers Select and Avanced), Kaspersky Total Security fro Business and Kaspersky Security for Virtualization

[5] Kaspersky Lab products detect CozyDuke components under the following verdicts:

  • Trojan.Win32.Cozybear.*
  • HEUR:Trojan.Win32.CozyDuke.gen
Tips