{"id":15062,"date":"2015-04-24T14:13:51","date_gmt":"2015-04-24T14:13:51","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=3890"},"modified":"2020-12-23T03:45:58","modified_gmt":"2020-12-22T16:45:58","slug":"no-monkeys-for-cozyduke-2","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/no-monkeys-for-cozyduke-2\/15062\/","title":{"rendered":"No Monkeys for CozyDuke"},"content":{"rendered":"<p>Yet another Duke APT is hitting high-profile targets, including the US government office. This time it\u2019s <a href=\"https:\/\/securelist.com\/blog\/research\/69731\/the-cozyduke-apt\/\" target=\"_blank\" rel=\"noopener\">CozyDuke<\/a> (also known as CozyBear, CozyCar or \u201cOffice Monkeys\u201d, \u00a0in honour of the video it employs as a decoy).<\/p>\n<p>The attack is notably sophisticated, including encrypted components, anti-detection capabilities and a fairly well developed set of malware components that feature structural similarities with earlier MiniDuke, CosmicDuke and Onion Duke threats.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>No Monkeys for #CozyDukeAPT<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FjKg2&amp;text=No+Monkeys+for+%23CozyDukeAPT\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p><strong>Office Monkeys are Dangerous<\/strong><\/p>\n<p>But, what really is worth mentioning \u2013 and, unfortunately, is quite a successful approach for many a targeted attack \u2013 is that this attack\u2019s initial penetration method is based entirely on social engineering techniques. The attackers are offering an extremely funny video about office-working apes as bait. The archive, including an executable video, is delivered via spear-phishing emails containing an attachment or a link to a website (sometimes a legitimate and even highly-rated site that has already been compromised).<\/p>\n<p>While the video plays, the attack\u2019s dropper is silently installed into the system, ready to receive commands and second stage malware components from the Command &amp; Control servers.<\/p>\n<p>The cybercriminals were not mistaken in thinking that most of those targeted would launch the video. Not only have they launched it; they\u2019ve shared it with office colleagues, thus actively assisting in the malware distribution process. Given the high profile of the targets, the amount of sensitive information that could potentially be stolen can only be guessed at.<\/p>\n<p>So the question is: how do you mitigate such a horrific threat, when even your own trusted employees are working against your carefully built security? And, yes, you shouldn\u2019t underestimate the power of social engineering: how many loyal employees would, for example, resist opening a link in a (carefully forged) letter from their boss?<\/p>\nDon\u2019t Let It Reign!\n<p><strong>How To Mitigate An Office Monkey Threat<\/strong><\/p>\n<p>Actually, several very basic security precautions or Mitigation Strategies can work effectively against even the most sophisticated and thoroughly planned APTs. For example, a simple curbing of administrative rights plus the timely patching of vulnerabilities and restricting the number of permitted apps can mitigate up to 85% of targeted attack-connected incidents.<a href=\"#_ftn1\" name=\"_ftnref1\" target=\"_blank\" rel=\"noopener\"><sup>[1]<\/sup><\/a><\/p>\n<p>Kaspersky lab\u2019s Application Control<a href=\"#_ftn2\" name=\"_ftnref2\" target=\"_blank\" rel=\"noopener\"><sup>[2]<\/sup><\/a> would be a valuable asset here; the Monkey video \u2013 as well as the other malware components of CozyDuke \u2013 would simply not be able to launch without being previously approved by a system administrator.\u00a0 Some administrative staff may have a limited range of duties and responsibilities, while dealing on a day to day basis with highly sensitive correspondence. Such a working scenario may be best addressed through adopting a Default Deny Applications Control mode, strictly limiting allowed executables to those system components and programs absolutely necessary to the individual\u2019s work activities.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>#CozyDukeAPT\u00a0initial penetration method is based entirely on #socialengineering<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FjKg2&amp;text=%23CozyDukeAPT%C2%A0initial+penetration+method+is+based+entirely+on+%23socialengineering\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Other useful strategies, especially appropriate to government agencies or other highly regulated enterprises, may include:<\/p>\n<ul>\n<li>using Web Control<a href=\"#_ftn3\" name=\"_ftnref3\" target=\"_blank\" rel=\"noopener\"><sup>[3]<\/sup><\/a> technology to restrict access only to permitted web resources, limited to those that are work-related \u2013 or at least only to certain site categories.<\/li>\n<li>applying e-mail content filtering, as offered by Kaspersky Security for Exchange \/ Linux Mail, to rule out suspicious emails and attachments (such as archives), perhaps depending on the recipient\u2019s role and seniority.<\/li>\n<li>using Device Control<a href=\"#_ftn4\" name=\"_ftnref4\" target=\"_blank\" rel=\"noopener\"><sup>[4]<\/sup><\/a> technology to avoid unsolicited transfers of information through the security perimeter to and from the outside world \u2013 or even within the perimeter. As well as helping prevent the spread of malware, this approach can offer protection against some forms of intentional data theft<\/li>\n<li>conducting specialized security training for employees, such as that offered by Kaspersky Lab as part of the <a href=\"https:\/\/www.kaspersky.com\/enterprise-it-security\/security-intelligence-services\/\" target=\"_blank\" rel=\"noopener nofollow\">Security Intelligence Services<\/a>. This will drive increased awareness and understanding of the dangers they face, even while sitting in their well-guarded offices. It also educates them on how to avoid many seemingly innocent, yet unsafe practices that could cost their business a fortune \u2013 or even constitute a threat to their country\u2019s security.<\/li>\n<\/ul>\n<p>Find out more about counter-APT mitigation strategies on the <a href=\"https:\/\/www.kaspersky.com\/enterprise-it-security\/\" target=\"_blank\" rel=\"noopener nofollow\">Enterprise IT Security Section of our web-site<\/a>.<\/p>\n<p><strong>Consider Something Bigger<\/strong><\/p>\n<p>Prior to an attack, APT actors will reconnoiter the targeted organization \u2013 including employee personas, business processes and current security solution specifics. This knowledge is used to help assess the target\u2019s vulnerabilities and to sidestep existing security mechanisms.<\/p>\n<p>So, when dealing with APTs, it is absolutely necessary to employ a multi-layered security approach, augmenting your trusted anti-malware <a href=\"#_ftn5\" name=\"_ftnref5\" target=\"_blank\" rel=\"noopener\"><sup>[5]<\/sup><\/a> with a number of proactive security measures covering different parts of your IT network. Thus armed and prepared, you become a formidably unattractive and unviable target for APTs.<\/p>\n<p><em><a href=\"#_ftnref1\" name=\"_ftn1\" target=\"_blank\" rel=\"noopener\"><sup>[1]<\/sup><\/a> Read the <a href=\"http:\/\/media.kaspersky.com\/en\/business-security\/APT-Report.pdf?icid=en-GL:ent-gallery\" target=\"_blank\" rel=\"noopener nofollow\">\u2018Future Risks: Be Prepared\u2019 \u2013 A Mitigation Strategies Special Report<\/a><\/em><\/p>\n<p><em><a href=\"#_ftnref2\" name=\"_ftn2\" target=\"_blank\" rel=\"noopener\"><sup>[2]<\/sup><\/a> Available in Kaspersky Endpoint Security for Business (tiers Select and Avanced), Kaspersky Total Security and Kaspersky Security for Virtualization<\/em><\/p>\n<p><em><a href=\"#_ftnref3\" name=\"_ftn3\" target=\"_blank\" rel=\"noopener\"><sup>[3]<\/sup><\/a> Available in Kaspersky Endpoint Security for Business (tiers Select and Avanced), Kaspersky Total Security and Kaspersky Security for Virtualization<\/em><\/p>\n<p><em><a href=\"#_ftnref4\" name=\"_ftn4\" target=\"_blank\" rel=\"noopener\"><sup>[4]<\/sup><\/a> Available in Kaspersky Endpoint Security for Business (tiers Select and Avanced), Kaspersky Total Security fro Business and Kaspersky Security for Virtualization<\/em><\/p>\n<p><em><a href=\"#_ftnref5\" name=\"_ftn5\" target=\"_blank\" rel=\"noopener\"><sup>[5]<\/sup><\/a> Kaspersky Lab products detect CozyDuke components under the following verdicts:<\/em><\/p>\n<ul>\n<li><em>Trojan.Win32.Cozybear.*<\/em><\/li>\n<li><em>HEUR:Trojan.Win32.CozyDuke.gen<\/em><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Yet another Duke APT is hitting high-profile targets, including the US government office. This time it&#8217;s CozyDuke (also known as CozyBear, CozyCar or &#8220;Office Monkeys&#8221;, \u00a0in honour of the video it employs as a decoy).<\/p>\n","protected":false},"author":610,"featured_media":15692,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,2994],"tags":[499,783,1076,2049],"class_list":{"0":"post-15062","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-apt","10":"tag-business-security","11":"tag-cozyduke","12":"tag-kaspersky-endpoint-security-for-business"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/no-monkeys-for-cozyduke-2\/15062\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/no-monkeys-for-cozyduke-2\/15062\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/no-monkeys-for-cozyduke-2\/15062\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/apt\/","name":"APT"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/15062","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/610"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=15062"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/15062\/revisions"}],"predecessor-version":[{"id":28655,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/15062\/revisions\/28655"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/15692"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=15062"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=15062"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=15062"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}