Ethical hacking-Penetration Testing: Necessary to protect your data

Ethical hacking-Penetration Testing: Necessary to protect your data

If you want to protect your personal or corporate data from hackers, it would be good to attend some lessons ...
Read More
inet infosec

Stand-alone vehicles: Is it really safe or not?

Most of us growing up, we have admired mainly in the movie these large stand-alone vehicles that were advanced and possessed ...
Read More

Are Ships Safe from Cyber ​​Attacks?

Nowadays, even ships are at risk of hacking. New systems they use to connect ...
Read More

Malicious insider attacks on financial services!

It is well known that the sector most affected by cyberattacks is the business sector and in particular financial services ....
Read More

FaceApp became viral again. Does it endanger our personal life?

FaceApp. The application is reverted to viral after two years of circulation. Its effects have improved and many influencers decided to bring back ...
Read More
Latest Posts

Snake Malware: a highly advanced malicious Project

Last week, researchers from German security company G Data Software reported for the first time about a very complex and sophisticated rootkit malware, Uroburos designed to steal data from secure installations and have the ability to take control of an infected machine, execute arbitrary commands and conceal its activities from the system owner.


Recently, British cyber experts from BAE Systems have unveiled a native Russian malware called 'SNAKE', which has remained virtually unnoticed for at least eight years, and has already penetrated a large number of security systems. Rootkit Uroburos was one of the components of this malware.

In a separate survey, Western intelligence officials have discovered another spyware that has infected hundreds of government computers across Europe and the United States and is known by the name "Turla." The researchers believed that Turla is directly linked to a old malicious campaign known as "Red October" or "Red October", a huge global spy-based Cyber ​​Project that was aimed diplomatically, militarily. nuclear and research networks.

"It is a sophisticated malware that is associated with other Russian , uses encryption and targets Western governments. It has Russian traces everywhere, "said Jim Lewis, a former US foreign affairs official.

Yesterday, the he analyzed the "extent of his poisonous" character which uses new tricks to overcome Windows security, including its ability to hide of the victim. The new malware features all the features of an extremely advanced Cyberproject that exploits vulnerabilities from user failures and also has the ability to do a vulnerability escalation that allows it to bypass Windows 64-bit, a vulnerability that resembles a well-known "zero-day" .

"His design shows that attackers have an arsenal of penetration tools and has all the features of an extremely advanced Cyberproject. The most remarkable thing is the trick used by developers to load unsigned malicious software into Windows 64bit systems, bypassing the core elements of Windows security, "said BAE.

Practice in the past was also known as Agent.BTZ discovered in 2008 when US defense ministry officials argued that their classified networks had been compromised by an earlier version of the same virus. Since then, many advanced features have been developed and added to make it even more versatile and more sophisticated than it used to be, BAE said.

According to , malware acts mainly in Eastern Europe, but also in the US, the UK and other Western European countries. Malware can penetrate systems running Windows XP, Vista, 7, and 8.

"Although there has been some awareness of SNAKE malware for a few years, we have not been able to uncover the full scope of its capabilities so far, and the threat presented to us is clearly something that needs to be taken more seriously," said , CEO of BAE Systems. "

The publication was at The Hacker News

Do you have an opinion? Leave your comment.

The author allows you to copy his / her text only if you report the source (, as an e-mail address (Live URL) of the article.
Updated on by

Reader Interactions

Leave a reply

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *