{"id":4789,"date":"2015-04-28T02:07:16","date_gmt":"2015-04-28T06:07:16","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=4789"},"modified":"2020-12-22T20:42:05","modified_gmt":"2020-12-22T16:42:05","slug":"no-monkeys-for-cozyduke","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/no-monkeys-for-cozyduke\/4789\/","title":{"rendered":"No monkeys for CozyDuke"},"content":{"rendered":"<p>Yet another APT of the \u2018Dukes family\u2019 is hitting high-profile targets, including the US government office. This time it\u2019s\u00a0<a href=\"https:\/\/securelist.com\/blog\/research\/69731\/the-cozyduke-apt\/\" target=\"_blank\" rel=\"noopener\">CozyDuke<\/a>, also known as CozyBear, CozyCar or \u201cOffice Monkeys\u201d in honor of the video it employs as a decoy.<\/p>\n<p>The attack is notably sophisticated, including encrypted components, anti-detection capabilities and a fairly well-developed set of malware components that feature structural similarities with earlier MiniDuke, CosmicDuke, and Onion Duke threats.<\/p>\n<h3>Office Monkeys are dangerous<\/h3>\n<p>What is really worth mentioning is that this attack\u2019s initial penetration method is based entirely on social engineering techniques. And, unfortunately, it is quite a successful approach for many targeted attacks.<\/p>\n<p>The attackers are offering an extremely funny video about office-working apes as bait. The archive, including an executable video, is delivered via spear-phishing emails containing an attachment or a link to a website, sometimes a legitimate and even highly-rated site that has already been compromised.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4791\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2015\/04\/05113135\/monkeys-2.png\" alt=\"monkeys-2\" width=\"330\" height=\"288\"><\/p>\n<p>While the video plays, the attack\u2019s dropper is silently installed into the system, ready to receive commands and second stage malware components from the Command &amp; Control servers.<\/p>\n<p>The cybercriminals were not mistaken in thinking that many recipients would launch the video. Not only have they launched it; they\u2019ve shared it with office colleagues, thus actively assisting in the malware distribution process. Given the high profile of the targets, the amount of sensitive information potentially stolen could be plentiful.<\/p>\n<p>So the question is: how do you mitigate such a horrific threat, when even your own trusted employees are working against your carefully built security? For sure, you shouldn\u2019t underestimate the power of social engineering: how many loyal employees would, for example, resist opening a link in a (carefully forged) letter from their boss?<\/p>\n<h3>How to mitigate an Office Monkey threat<\/h3>\n<p>Actually, several very basic security precautions or Mitigation Strategies can work effectively against even the most sophisticated and thoroughly planned APTs. For example, a simple curbing of administrative rights plus the timely patching of vulnerabilities and restricting the number of permitted apps can mitigate\u00a0<a href=\"http:\/\/media.kaspersky.com\/en\/business-security\/APT-Report.pdf?icid=en-GL:ent-gallery\" target=\"_blank\" rel=\"noopener nofollow\">up to 85% of targeted attack-connected incidents<\/a>.<\/p>\n<p>Kaspersky lab\u2019s Application Control\u00a0would be a valuable asset here. The Monkey video \u2014 as well as the other malware components of CozyDuke \u2014 would simply not be able to launch without being previously approved by a system administrator.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">The White House, US State Department and others are counted among <a href=\"https:\/\/twitter.com\/hashtag\/CozyDukeAPT?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#CozyDukeAPT<\/a> victims \u2013 <a href=\"http:\/\/t.co\/nXaf9mj6cK\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/nXaf9mj6cK<\/a> <a href=\"http:\/\/t.co\/FSRwlgClmD\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/FSRwlgClmD<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/591553485969215488?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">April 24, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Some administrative staff may have a limited range of duties and responsibilities, while dealing on a day-to-day basis with highly sensitive correspondence. Such a working scenario may be best addressed through adopting a Default Deny Applications Control mode, strictly limiting allowed executables to those system components and programs absolutely necessary to the individual\u2019s work activities.<\/p>\n<p>Other useful strategies, especially appropriate to government agencies or other highly regulated enterprises, may include:<\/p>\n<ul>\n<li>Using Web Control technology to restrict access only to permitted web resources, limited to those that are work-related \u2014 or at least only to certain site categories.<\/li>\n<li>Applying e-mail content filtering, as offered by Kaspersky Security for Exchange \/ Linux Mail, to rule out suspicious emails and attachments (such as archives), perhaps depending on the recipient\u2019s role and seniority.<\/li>\n<li>Using Device Control technology to avoid unsolicited transfers of information through the security perimeter to and from the outside world \u2014 or even within the perimeter. As well as helping prevent the spread of malware, this approach can offer protection against some forms of intentional data theft.<\/li>\n<li>Conducting specialized security training for employees, such as that offered by Kaspersky Lab as part of the\u00a0<a href=\"https:\/\/www.kaspersky.com\/enterprise-it-security\/security-intelligence-services\/\" target=\"_blank\" rel=\"noopener nofollow\">Security Intelligence Services<\/a>. This will drive increased awareness and understanding of the dangers they face, even while they sit in their well-guarded offices. It also educates them on how to avoid many seemingly innocent, yet unsafe practices that could cost their business a fortune \u2014 or even constitute a threat to their country\u2019s security.<\/li>\n<\/ul>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Check out Kaspersky Lab's Targeted <a href=\"https:\/\/twitter.com\/hashtag\/Cyberattacks?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Cyberattacks<\/a> Logbook <a href=\"https:\/\/t.co\/X3IemS4Jf9\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/X3IemS4Jf9<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/SecurityWithoutBorders?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#SecurityWithoutBorders<\/a> <a href=\"http:\/\/t.co\/p441mWhfuG\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/p441mWhfuG<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/581614311203868672?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">March 28, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<h3>Consider something bigger<\/h3>\n<p>Prior to an attack, APT actors will reconnoiter the targeted organization \u2014 including employee personas, business processes, and current security solutions specifics. This knowledge is used to help assess the target\u2019s vulnerabilities and to sidestep existing security mechanisms.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>How to mitigate #CozyDukeAPT threat<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FNWm1&amp;text=How+to+mitigate+%23CozyDukeAPT+threat\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>So, when dealing with APTs, it is absolutely necessary to employ a multi-layered security approach, augmenting your trusted\u00a0<a href=\"https:\/\/www.kaspersky.com\/business-security\" target=\"_blank\" rel=\"noopener nofollow\">anti-malware<\/a>\u00a0with a number of proactive security measures covering different parts of your IT network. Thus armed and prepared, you become a formidably unattractive and unviable target for APTs.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Yet another APT of the \u2018Dukes family\u2019 is hitting high-profile targets, including the US government office. This time it\u2019s\u00a0CozyDuke, also known as CozyBear, CozyCar or \u201cOffice Monkeys\u201d in honor of<\/p>\n","protected":false},"author":40,"featured_media":4790,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,1486],"tags":[477,983,36,97,984],"class_list":{"0":"post-4789","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-apt","10":"tag-cozyduke","11":"tag-malware-2","12":"tag-security-2","13":"tag-spear-phishing"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/no-monkeys-for-cozyduke\/4789\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/no-monkeys-for-cozyduke\/4837\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/no-monkeys-for-cozyduke\/5298\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/no-monkeys-for-cozyduke\/5705\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/no-monkeys-for-cozyduke\/5958\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/no-monkeys-for-cozyduke\/5987\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/no-monkeys-for-cozyduke\/7654\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/no-monkeys-for-cozyduke\/8543\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/no-monkeys-for-cozyduke\/4495\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/no-monkeys-for-cozyduke\/5218\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/no-monkeys-for-cozyduke\/2921\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/no-monkeys-for-cozyduke\/7488\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/no-monkeys-for-cozyduke\/7654\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/no-monkeys-for-cozyduke\/8543\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/no-monkeys-for-cozyduke\/8543\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/apt\/","name":"APT"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4789","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=4789"}],"version-history":[{"count":4,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4789\/revisions"}],"predecessor-version":[{"id":17792,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4789\/revisions\/17792"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/4790"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=4789"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=4789"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=4789"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}