Two threads on this matter by the looks of it...
Is it yet known whether these attacks only work on windows machines or can they attack anything, what about mac or linux machines.
If a computer with this type of infection was booted from an alternate operating system would the malware stil be able to perform actions against the user and monitor their activities?
What if an infected computer had it's hard drive removed and was then used by booting from a live operating system on a USB drive?
Now that the world knows about this it will only be a matter of time before others manage to get hold of and reverse enginner a copy, then the entire criminal community might start deploying attacks using some of the principles here.
As far as the spreading methods are concerned it seems two methods were used, drive-by style exploits and compromised removable storage hardware. Would normal steps against drive-bys (Noscript (or equivalents), disabling plugins, up to date browsers) and against compromised USB or cd discs (disabling autoplay/autorun, scanning the devices with antivirus and antimalware before opening any files on them, avoiding running any exe files on them)be enough to prevent these?
"Come on all you white hatz .. give us the tools we need !" with any luck there will be many good people out there doing just that, but no-one can act instantly, it will be quite a while before solutions to this type of threat become available. With something like this discovering it's existence is only half the battle.
Edited by rp88, 18 February 2015 - 02:45 PM.
Back on this site, for a while anyway, been so busy the last year.
My systems:2 laptops, intel i3 processors, windows 8.1 installed on the hard-drive and linux mint 17.3 MATE installed to USB