Scary stuff. It almost like to have to use a live CD for everything to feel safe now.
A malware instance built on the shoulders of a trojan so powerful it lead to the creation of the US Cyber Command has been updated with Linux-popping capabilities, Kaspersky researcher Kurt Baumgartner says.
The Turla advanced malware is thought to have employed its top notch stealth capabilities to remain hidden on some systems for up to four years, however those same traits meant much about its full capabilities and the extend of victims was unknown.
A suspected nation-state actor, thought by G-Data to be Russia, has in the past deployed the Windows variant to infect government embassies and military agencies along with pharmaceutical, education and research companies across some 45 countries.
According to Symantec attackers established watering holes - infected websites popular with victims - to gain a foothold in organisations from where research was conducted to identify and compromise the most valuable targets.
Baumgartner said the module written in C and C++ was hardened against reverse-engineering through the use of stripped symbol information and hidden network communications, adding it could not be discovered using Netstat.
It contained attack capabilities which did not require root privileges including arbitrary remote command execution, incoming packet interception and remote management.
Edit: The comment section is interesting.
Edited by JohnC_21, 09 December 2014 - 10:31 AM.