← Supply-Chain Attack Compendium

MB Connect Line

Incident Summary

MB Connect Line installer distributed Havex.

As part of the DragonFly/Energetic Bear campaign, MB Connect Line, a German vendor of industrial routers and remote access solutions, had a software installer on their website trojanized with the Havex Remote Access Trojan (RAT). This allowed attackers to gain a foothold in networks of organizations that downloaded and installed the compromised software. This record tracks the MB Connect Line product scope specifically; related Havex vendor compromises are tracked separately.

Date
2013-01-01 to 2014-06-01
Category
Commercial
Target Surface
Distribution
Insertion Phase
distribution
Impact
Backdoor
Cause
Website compromise

What Was Affected

Package MB Connect Line
LanguageC++
ComponentApplication
Artifact typebinary archive
Domain typeproject download host

Compromised Versions

  • Specific software installers available for download from their website during the compromise period.

Incident Context

Motive
Espionage
Attribution
Nation-state
Transitive
No
Observed Duration
516 days

Evidence

Compromised Artifacts

  • Trojanized MB Connect Line software installer (e.g., for mbCHECK, mbCONF), downloaded from mbconnectline.com during 2013-2014.

Current Artifacts and Analysis

Indicators and Changes

Hashes

  • sha256:09a35ac2f7f9ca156c3a2ab2466c029976535390099101632e904a7ca3f6764d
  • sha256:4a1a783a11c1a2a9d5915717b16ebb5012c685f4457a08246666d7d2f7dcb238
  • md5:f691c8f16e290f829710ff0a18ff2532

External References

Source Data

Source record: proprietary/mb_connect/meta.yaml