Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Friday, 24 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Snake virus hits users outside Ukraine

by The Gurus
March 11, 2014
in Editor's News
Share on FacebookShare on Twitter

A widely-reported virus that has infected users in the Ukraine has been detected as widely as the UK and USA.
 
Called the “Snake” or “Uroboros” virus, it has been compared to the Stuxnet worm and the finger of blame has been pointed at Russia. According to io9.com, the virus works by giving the attacker full remote access to the compromised system and it has the ability to stay inactive for a number of days.
 
According to Jaime Blasco, director of AlienVault labs, the virus, also known as Turla, is related to another piece of malware called Agent.BTZ that was found in an USB stick in 2008 in a parking lot of a government building in the United States.
 
Analysis of the malware by BAE Systems Applied Intelligence has found that its developers operate in the same timezone as Moscow and some Russian text is embedded into the code. BAE said it identified 14 cases of Snake in Ukraine since the start of 2014, and in all there have been 32 reported cases in Ukraine since 2010, out of 56 worldwide.
 
Analysis of the malware development by BAE revealed that the malware has actually been in development since at least 2005 and the complexity, range of variants and techniques used by the malware suggests that Snake’s authors and operators are committed and well-funded professionals.
 
Tom Cross, director of research at Lancope, said that technically speaking, this is a rootkit as it is designed to enable attackers to hide on a computer network and exfiltrate data covertly. “It is not surprising to see state sponsored malware like Snake appearing on networks in Ukraine in the midst of the Crimean crisis,” he said.
 
“Malware activity is an integral part of international conflict today. Usually, malware is used by each side of a conflict to spy on the other side. Sometimes, such as in the case of Stuxnet, malware can also be used to disable critical systems and infrastructure. I’m not aware of any reports of Uroburos being used to disable critical infrastructure, but if a violent conflict breaks out in Ukraine it would not be surprising to see cyber attacks used in that capacity.”
 
Blasco said that there was no clear infection vector yet, but he suspected that a combination of Spear phishing campaigns, waterhole and strategic web compromises and even physical access to drop payloads was used.
 
Asked if he felt that the sudden prevalence of the Snake virus was tied to the current situation in Russia/Ukraine, Blasco pointed out the timing and the fact that it had been detected in Lithuania, UK, Belgium and Georgia too. “That being said” Blasco continued, “the current geopolitical situations of those countries makes them a good target to acquire geopolitical intelligence f
rom several countries (not only Russia). As we know there are several clues that points to the Russian origin of Snake.”
 
BAE called this a game changer. Martin Sutherland, managing director of BAE Systems Applied Intelligence, said: “Although there has been some awareness of the Snake malware for some years, until now the full scale of its capabilities could not be revealed, and the threat it presents is clearly something that needs to be taken much more seriously.
 
“The threat described in this report really does raise the bar in terms of what potential targets, and the security community in general, have to do to keep ahead of cyber attackers. As the Snake research clearly illustrates, the challenge of keeping confidential information safe will continue for many years to come. Hopefully, however, this research will help potential targets to better understand the nature of their threat adversary, and how they can build appropriate defences.”

FacebookTweetLinkedIn
Tags: attackVirus
ShareTweetShare
Previous Post

Accuvant to be acquired by asset management firm

Next Post

Hackers exploit WordPress security flaws to carry out cyber-attacks

Recent News

call centre

MyCena Improves Customer Data Access Protection in Call Centers and BPOs

March 23, 2023
Blue logo, capitalised letters. SPECOPS.

Fortune 500 Company Names Found in Compromised Password Data

March 23, 2023
Ferrari Data Breach: The Industry has its say

Ferrari Data Breach: The Industry has its say

March 22, 2023
security

What Is Observability, And Why Is It Crucial To Your Business?

March 21, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information