Turla case: World business of "Russian" cyber targeting

Yesterday we published the “Snake Malware: a highly advanced malicious Project. ” The Snake is Russian-made (but you never know) like the "Turla." The above article describes the actions of both as well as their related malware. Today in.gr published an article presenting Turla. We republish it:
A highly sophisticated cyberguard code, which seems to be the work of the Russian government, has been contaminating hundreds of government computers in Europe and the United States for years.

The malware, known as Turla, is a "rootkit" that hides on infected systems and allows its creators to install and run eavesdropping and spying tools on a case-by-case basis. "It is advanced malware associated with other Russian cyber, uses encryption and targets Western governments. It is full of Russian » δήλωσε στο Reuters ο Τζιμ Λιούις, πρώην αξιωματούχος του Στέιτ Ντιπάρτμεντ και νυν στέλεχος του Κέντρου Στρατηγικών και Διεθνών Μελετών στην Ουάσινγκτον.Στη Βρετανία, η BAE Systems Applied Intelligence, θυγατρική του ομίλου αμυντικών συστημάτων BAE, ανακοίνωσε ότι μέχρι σήμερα έχει συγκεντρώσει 100 «μοναδικά δείγματα» του κακόβουλου λογισμικού, στα οποία περιλαμβάνονται 32 από την Ουκρανία, 11 από τη Λιθουανία, 4 από τη Βρετανία και λιγότερα από άλλες χώρες.Στην πραγματικότητα όμως το εύρος των επιθέσεων πρέπει να είναι πολύ μεγαλύτερο. Σύμφωνα με ειδικούς που επικαλείται το πρακτορείο Reuters, το Turla μοιάζει να είναι μια αναβαθμισμένη έκδοση του ιού Agent.BTZ, ο οποίος χρησιμοποιήθηκε σε κυβερνοεπίθεση εναντίον του Πενταγώνου που αποκαλύφθηκε το 2008.Σύμφωνα με την εταιρεία ασφάλειας Kaspersky Labs, Turla is also linked to the international cyberespionage operation "Red October", which was exposed in early 2013 by Kaspersky.Computer security company Symantec estimates that up to 1.000 have been infected by either Turla or Agent.BTZ. He does not name the targets, but says most are government computers.

Symantec's Eric Chien describes Turla as an "evolution of Agent.BTZ". According to Finnish security company F-Secure, Agent.BTZ was first discovered in 2008 on NATO's European military network.

All of the above computer security companies estimate that the technical complexity and features of the program indicate that it is a state service creator.

Turla has been silently watched for two years, but it is now coming to the forefront afterwards a report by the German company G Data, η οποία ονομάζει το «ουροβόρο», μια λέξη που υπάρχει στον κώδικα και παραπέμπει στο μυθικό φίδι που τρώει την ουρά του.

G Data reports that Turla has "Russian" roots, but declined to disclose what the targets were.

Fico's Mikko Haiponen, Turla "seems to be Russian, but there is no way to be sure."

The same was stressed by other security researchers - the only way to confirm suspicions would be to take Moscow directly responsible.

Russian intelligence agency FSB, however, refused to comment on the issue at Reuters. The same was done by officials from the Pentagon and the Department of Foreign Security.

Newsroom DOL

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.100 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).