ProjectSauron malware

Discussion in 'Off-topic' started by Gass, Aug 9, 2016.

  1. Gass

    Gass Member

    Joined:
    Jan 30, 2015
    Messages:
    437
    "The actor behind ProjectSauron is very advanced, comparable only to the top-of-the top in terms of sophistication: alongside Duqu, Flame, Equation, and Regin," the Kaspersky researchers wrote. "Whether related or unrelated to these advanced actors, the ProjectSauron attackers have definitely learned from them."

    The main purpose of the malware platform was to obtain passwords, cryptographic keys, configuration files, and IP addresses of the key servers related to any encryption software that was in use. Infected groups include government agencies, scientific research centers, military organizations, telecommunication providers, and financial institutions in Russia, Iran, Rwanda, China, Sweden, Belgium, and possibly in Italian-speaking countries.

    Read more from the SOURCE: http://arstechnica.com/security/201...sually-advanced-malware-that-hid-for-5-years/