Tied to DNC breach
Less than six hours after Donald Trump won the US presidential election, a new spear phishing campaign was launched by a Russia-based group. The group is apparently one of the two organizations connected to the breach at the Democratic National Committee, and it’s responsible for nearly a decade of intelligence collection campaigns against military and diplomatic targets.
Security firm Volexity refers to the group as “the Dukes” based on the malware family being utilized. According to a report by Volexity founder Steven Adair, the group is known for a malware family known as “the Dukes”—also referred to as APT29 or “Cozy Bear.” The Dukes’ primary targets in this latest round of attacks appear to be non-governmental organizations (NGOs) and policy think tanks in the US.