The CozyDuke, the last Russian APT group

Kaspersky Lab discovered another APT group dubbed CozyDuke which is believed to have hacked the US Department of State and the White House.

Experts at Kaspersky Lab have uncovered a new advanced persistent threat (APT) dubbed CozyDuke that targeted several high-profile organizations in the second half of 2014. Kaspersky experts have published an interesting blog post that includes numerous technical details on the espionage campaign run by the CozyDuke APT group.

The most interesting part of the investigation are the similarities between the are the similarities between the CozyDuke and other APT groups such as CosmicDukeMiniDuke, and OnionDuke.

The hackers belonging the CozyDuke APTs used spear phishing emails as an attack vector, sometimes the message includes links to malicious websites controlled by attackers and used to serve exploit kits, in other case the email included malicious Flash video attachments.

“The actor often spearphishes targets with e-mails containing a link to a hacked website.“ Kaspersky researchers explained in the report. “In other highly successful runs, this actor sends out phony flash videos directly as email attachments. A clever example is “Office Monkeys LOL”. The executable within not only plays a flash video, but drops and runs another CozyDuke executable. “

Once compromised the targeted system, the malware checks for the presence of defense solutions from principal security vendors, including Kaspersky, Avira, Comodo, Crystal Security, Dr. Web and Sophos.

In order to elude defense solutions, the components of the CozyDuke executable are signed with fake Intel and AMD digital certificates.

The experts at Kaspersky discovered that one of the second stage modules of CozyDuke appears to have been developed on the same platform as OnionDuke.

“One of the second stage modules of CozyDuke/Cozy Bear, Show.dll, is particularly interesting because it appears to have been built onto the same platform as OnionDuke” continues the report.

This means that malicious codes used by CozyDuke and OnionDuke APTs were written by the same developers or the two development teams work together.

CozyDuke vs onionduke

The experts also noted that communications between the malicious code and their C&C servers are managed in the same way.