snake

Snake Malware: a highly advanced malicious Project

Last week, researchers from the German security company G Data reported for the first time a very complex and sophisticated malware , Uroburos which is designed to steal data from secure installations and has the ability to take control of an infected machine, execute arbitrary commands and hide its activities from the system owner.  

FE13AHPESTS

Recently, British cyber experts from BAE Systems revealed the native Russian malware dubbed 'SNAKE', which has remained virtually undetected for at least eight years, while already penetrating a large number of security systems. The Uroburos Rootkit was one of the components of this malware.

In a separate , Western intelligence officials have discovered another spyware, which has infected hundreds of government computers across Europe and the United States, and is known as “Turla.” Researchers believed that Turla was directly linked to an earlier malicious campaign known as "Red October" or "Red October", a huge global spy-based Cyber ​​Project that was aimed diplomatically, militarily. nuclear and research networks.

"It's an advanced malware that is connected to other Russian , uses and targets Western governments. It has Russian traces all over it,” said Jim Lewis, a former US State Service official.

Yesterday, the analyzed the "extent of its poisonous" character which uses new tricks to overcome Windows security, including its ability to hide of the victim. The new malware features all the features of an extremely advanced Cyberproject that exploits vulnerabilities from user failures and also has the ability to do a scalability vulnerability that allows it to bypass Windows 64-bit, a vulnerability that is very similar to a well-known "zero-day" .

"Its design shows that the attackers have an arsenal of penetration tools and have all the characteristics of a highly advanced Project in cyberspace. "The most notable is the trick used by developers to load unsigned malware into 64-bit Windows systems, bypassing essential elements of Windows security," BAE said.

The practice, formerly known as Agent.BTZ, was discovered in 2008 when employees of the US Department of Defense claimed that their classified networks had been breached by an early of the same virus. Since then it has been developed and many advanced features have been added making it even more versatile and sophisticated than before, BAE reports.

According to , malware acts mainly in Eastern Europe, but also in the US, the UK and other Western European countries. Malware can penetrate systems running Windows XP, Vista, 7, and 8.

"Although there has been some awareness of SNAKE malware for a number of years, so far we have not been able to reveal its full potential, and the threat presented to us is clearly something that should be taken much more seriously," he said. , CEO of BAE Systems. "

The publication was at The Hacker News

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.091 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).