By Ellen Nakashima,
Computer security researchers have uncovered malware that appears to have been used as part of a widespread cyber espionage campaign targeting European diplomatic and government agencies.
Kaspersky Lab, a global firm based in Moscow, said in a report released Monday that the malware rivals in complexity the Flame virus, a cyber-spying tool that was created by the United States and Israel for use against Iran.
The newly discovered malware, called Rocra, has been in existence for at least five years and appears to have been written by Russian speakers using Chinese exploit code that silently installs malware. It was still active as of early January.
Among other things, Rocra has been used to steal encrypted files and decryption keys used by European Union organizations and NATO, said Roel Schouwenberg, a Kaspersky researcher based in Boston.
The malware also can map out the internal layout of a computer network, the configuration of routers, and hijack files from thumb drives and smartphones, he said. It records keystrokes, makes screenshots, recovers deleted files and encrypts data it steals. It makes unique identifiers for each target to more easily catalogue the data stolen.
Rocra is not as sophisticated as Flame, which spread through Windows software updates. But it appears to be far more elegant than the “rudimentary” malware coming from China, which has been used to siphon vast amounts of proprietary data from companies and governments around the world, Schouwenberg said.
Kaspersky’s researchers began analyzing the malware in October and determined it was targeting organizations mostly in Eastern Europe, but also in Central Asia, Western Europe and North America. Targets include trade and commerce organizations, nuclear and energy research groups, oil and gas companies and the aerospace industry. They also include a handful of non-U.S. diplomatic organizations inside the United States.
The lab does not know who is behind the malware, whether it is a national government or criminals looking to sell the data to a government. “Over the past six months, we’re starting to notice a pattern where cyber criminals are stealing information from a bigger scope of targets,” Schouwenberg said.
So far, the lab has counted several hundred infections worldwide, with Russia and other Eastern European countries leading the list. But Iran and the United States also have been hit, according to the report.
Researchers said it’s likely there are far more targets that they have been unable to detect.