Site icon WinCert

Malware created as a perfect undercover agent

<p>We have all seen spy movies where an agent is infiltrated in an illegal organization and stays like that for years&comma; gathering information for the police&comma; and never gets discovered until the very end&period; Sounds like a movie that would be liked by many&period; But have you ever heard of a similar scenario but the one that involves dangerous malware&quest;<&sol;p>&NewLine;<p><a href&equals;"https&colon;&sol;&sol;www&period;wincert&period;net&sol;wp-content&sol;uploads&sol;2016&sol;08&sol;monitor&period;jpg"><img class&equals;"alignnone wp-image-1935 size-full" title&equals;"malware" src&equals;"https&colon;&sol;&sol;www&period;wincert&period;net&sol;wp-content&sol;uploads&sol;2016&sol;08&sol;monitor&period;jpg" alt&equals;"malware" width&equals;"640" height&equals;"451" &sol;><&sol;a><&sol;p>&NewLine;<p>That is definitely not a movie&comma; but reality and the dangerous malware managed to stay hidden for six years before being discovered&period; This malware is most advanced which means it was developed for someone who had the money to afford it and it was among the most advanced attack platforms ever discovered&period; They named it Slingshot because that was the term most often used in parts of the malware that was recovered&period;<&sol;p>&NewLine;<p>The reason why Slingshot was created was espionage&period; It would log desktop activity and all of its content&comma; collected screenshots&comma; keyboard and USB data and many other passwords&period; Slingshot was created with the ability to access the data on the infected computer&comma; whether it was the hard drive or the internal memory&period;<&sol;p>&NewLine;<p>The malware is very sneaky and dangerous&comma; created in a technically elegant way&period; It combines old and new components and was created for a long-term operation&comma; without ever being discovered&period; Specifics of the router technique have not been revealed yet&comma; but they involve using a MikroTik configuration utility called Windbox&period; It downloads dynamic link library files from the router&&num;8217&semi;s file system&comma; transfers the malicious agent to the desired computer and then does what it was created to do&period;<&sol;p>&NewLine;<p>This malware may be dangerous but its creation is unique and remarkable&period; If only such knowledge and talent would be used for good of mankind and not to cause damage&period;<&sol;p>&NewLine;

Exit mobile version