Tuesday, March 13, 2018
Advanced malware attacks PCs through network routers
Security researchers at Kaspersky Lab have discovered what's likely to be another state-sponsored malware strain, and this one is more advanced than most. Nicknamed Slingshot, the code spies on PCs through a multi-layer attack that targets MikroTik routers. It first replaces a library file with a malicious version that downloads other malicious components, and then launches a clever two-pronged attack on the computers themselves. One, Canhadr, runs low-level kernel code that effectively gives the intruder free rein, including deep access to storage and memory; the other, GollumApp, focuses on the user level and includes code to coordinate efforts, manage the file system and keep the malware alive. Kaspersky describes these two elements as "masterpieces," and for good reason. For one, it's no mean feat to run hostile kernel code without crashes. Slingshot also stores its malware files in an encrypted virtual file system, encrypts every text string in its modules, calls services directly (to avoid tripping security software checks) and even shuts components down when forensic tools are active. If there's a common method of detecting malware or identifying its behavior, Slingshot likely has a defense against it. It's no wonder that the code has been active since at least 2012 -- no one knew it was there. Recent MikroTik router firmware updates should fix the issue. However, there's concern that other router makers might be affected
Learn More
https://www.engadget.com/2018/03/11/sophisticated-malware-attacks-through-routers/
https://www.theinquirer.net/inquirer/news/3028277/sophisticated-state-sponsored-slingshot-m
https://www.techrepublic.com/article/newly-discovered-slingshot-malware-was-hidden-in-
Labels:
tech/pc
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment