Site icon WinCert

Project Sauron: The software which spies on the Web

<p>A sophisticated form of malicious malware&comma; known under the name Project Sauron&comma; has been spying on a number of big organizations for 5 years&period;<&sol;p>&NewLine;<h4><strong>It is widely believed that this software has been funded with the help of a very powerful country&comma; even though it is not certain which country this is&period;<&sol;strong><&sol;h4>&NewLine;<p><a href&equals;"https&colon;&sol;&sol;www&period;wincert&period;net&sol;wp-content&sol;uploads&sol;2016&sol;08&sol;sauron&period;png"><img class&equals;"alignnone wp-image-1938 size-full" src&equals;"https&colon;&sol;&sol;www&period;wincert&period;net&sol;wp-content&sol;uploads&sol;2016&sol;08&sol;sauron&period;png" alt&equals;"project sauron" width&equals;"640" height&equals;"441" &sol;><&sol;a><&sol;p>&NewLine;<p>Project Sauron masks itself in some sort of a directory no one would ever open&comma; and then it begins to act very unexpectedly&period;  This makes it a malware which is very hard to detect and track down&period; Various experts from Kaspersky Lab and Symantec think that its basic function was to spy on the device it has infected&period; They have found hard evidence that this malicious software was spying on more than 30 different organizations across Russia&comma; Iran&comma; Belgium and China&period;<&excl;--more--><&sol;p>&NewLine;<p>The scariest thing is that most of these organizations were connected with various militaries&comma; governments or financial institutions&period; Because of this&comma; it is thought that this is a case of very serious espionage&period;<&sol;p>&NewLine;<p>Once it infects a computer&comma; Project Sauron can steal files&comma; passwords or any other form of data&period; It gives the hackers unrestricted access to an infected computer&period;<&sol;p>&NewLine;<p>It is almost impossible to track down the hackers because the virus always uses a different method to send back data&period; A solid pattern is the key to defeating malware like this&comma; but it seems like the hackers have covered their backs very well&period;<&sol;p>&NewLine;<p>The malware has also been found in computers which are under constant &OpenCurlyDoubleQuote;quarantine”&comma; meaning they are not connected to the internet in any way&period; This was likely done through infected USB drives being inserted into the target computers&period; And still no one knows how it manages to spread so fast while remaining hidden for years&period;<&sol;p>&NewLine;

Exit mobile version