Hackers target European governments - research
Entities in Belgium and Ukraine were among those targeted by the malicious software.
SAN FRANCISCO - Hackers targeted dozens of computer systems at government agencies across Europe in a series of attacks that exploited a recently discovered security flaw in Adobe Systems Inc's software, security researchers reported on Wednesday.
Russia's Kaspersky Lab and Hungary's Laboratory of Cryptography and System Security, or CrySyS, said the targets of the campaign included government computers in the Czech Republic, Ireland, Portugal and Romania.
They also said a think tank, research institute and healthcare provider in the United States, a prominent research institute in Hungary and other entities in Belgium and Ukraine were among those targeted by the malicious software, which they have dubbed "MiniDuke".
The researchers, who declined to further elaborate on the victims' identities, released their findings as more than 20,000 security professionals gathered in San Francisco for the annual RSA conference.
The researchers suspect MiniDuke was designed for espionage, but were still trying to figure out the attack's ultimate goal.
Boldizsár Bencsáth, a cyber security expert who runs the malware research team at CrySyS, told Reuters that he had reported the incident to NATO's Computer Incident Response Capability, a group that analyzes and responds to cyber threats. NATO officials declined comment.
The MiniDuke operators used an unusual approach to communicate with infected machines, according to the researchers. The virus was programmed to search for Tweets from specific Twitter accounts that contained instructions for controlling those PCs. In cases where they could not access those Tweets, the virus ran Google searches to receive its marching orders.
Officials with Twitter and Google could not immediately be reached.
MiniDuke attacked its victims by exploiting recently discovered security bugs in Adobe's Reader and Acrobat software, according to the researchers. The attackers sent their targets PDF documents tainted with malware, an approach that hackers have long used to infect personal computers.
Bencsáth said he believed the attackers installed "back doors" at dozens of organizations that would enable them to view information on those systems, then siphon off data they found interesting.
He said researchers have yet to uncover evidence that the operation had moved to the stage where operators had begun to exfiltrate data from their victims.
"This is a unique, fresh and very different type of attack," said Kurt Baumgartner, a senior security researcher with Kaspersky Lab. "The technical indicators show this is a new type of threat actor that hasn't been reported on before."
He said he would not speculate on who the hackers might be.
But Bencsáth said he believed a nation state was behind the attack because of the level of sophistication and the identity of the targets, adding that it was difficult to identify which country was involved.
The MiniDuke hackers exploited security bugs in Reader and Acrobat software that were first identified two weeks ago by Silicon Valley security firm FireEye. The firm reported that hackers were infecting machines by circulating PDFs tainted with malicious software.
Adobe released an update last week that once installed, should protect customers from MiniDuke.