Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

NWCorona

(8,541 posts)
Tue Aug 9, 2016, 04:16 AM Aug 2016

Researchers crack open unusually advanced malware that hid for 5 years

Source: Arstechnica

Security experts have discovered a malware platform that's so advanced in its design and execution that it could probably have been developed only with the active support of a nation state.

The malware—known alternatively as "ProjectSauron" by researchers from Kaspersky Lab and "Remsec" by their counterparts from Symantec—has been active since at least 2011 and has been discovered on 30 or so targets. Its ability to operate undetected for five years is a testament to its creators, who clearly studied other state-sponsored hacking groups in an attempt to replicate their advances and avoid their mistakes. State-sponsored groups have been responsible for malware like the Stuxnet- or National Security Agency-linked Flame, Duqu, and Regin. Much of ProjectSauron resides solely in computer memory and was written in the form of Binary Large Objects, making it hard to detect using antivirus.

Part of what makes ProjectSauron's so impressive is its ability to collect data from air-gapped computers. To do this, it uses specially prepared USB storage drives that have a virtual file system that isn't viewable by the Windows operating system. To infected computers, the removable drives appear to be approved devices, but behind the scenes are several hundred megabytes reserved for storing data that is kept on the air-gapped machines. The arrangement works even against computers in which data-loss prevention software blocks the use of unknown USB drives.

Kaspersky researchers still aren't sure precisely how the USB-enabled exfiltration works. The presence of the invisible storage area doesn't in itself allow attackers to seize control of air-gapped computers. The researchers suspect the capability is used only in rare cases and requires use of a zero-day exploit that has yet to be discovered. In all, Project Sauron is made up of at least 50 modules that can be mixed and matched to suit the objectives of each individual infection.

Read more: http://arstechnica.com/security/2016/08/researchers-crack-open-unusually-advanced-malware-that-hid-for-5-years/



The ability to jump the gap is crazy stuff.
12 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
Researchers crack open unusually advanced malware that hid for 5 years (Original Post) NWCorona Aug 2016 OP
There was a BIOS hack that allowed air-gap control via infrasonic signals Recursion Aug 2016 #1
Agreed! The technology that's coming on line is both scary and amazing NWCorona Aug 2016 #9
Aliens, obviously. truthisfreedom Aug 2016 #2
5 years is an eternity in Tech Moliere Aug 2016 #3
It didn't "jump the gap" spinbaby Aug 2016 #4
Yeah you are right. that term can be viewed a few ways. That's why I left off the word "air" NWCorona Aug 2016 #10
Lazy or careless cannabis_flower Aug 2016 #11
Epoxy, and... reACTIONary Aug 2016 #12
So was it depending on a physical USB drive or was it creating a cstanleytech Aug 2016 #5
Sounds like it was coopting part of a separate USB drive's memory. Igel Aug 2016 #6
Windows operating system FigTree Aug 2016 #7
You can find examples Plucketeer Aug 2016 #8

Recursion

(56,582 posts)
1. There was a BIOS hack that allowed air-gap control via infrasonic signals
Tue Aug 9, 2016, 04:30 AM
Aug 2016

At least that was the assumption since physically disconnecting the mic stopped it.

A computer's IR receiver would also work, and for that matter a monitor can function as an AM tuner...

NWCorona

(8,541 posts)
9. Agreed! The technology that's coming on line is both scary and amazing
Tue Aug 9, 2016, 02:43 PM
Aug 2016

I'm just thinking about the fact that it was latent for over five years and how it was able to avoid patten mapping.

Also the bridging method is the most troubling part of the whole article.

"The arrangement works even against computers in which data-loss prevention software blocks the use of unknown USB drives."

spinbaby

(15,089 posts)
4. It didn't "jump the gap"
Tue Aug 9, 2016, 08:26 AM
Aug 2016

It depended on someone plugging in an infected USB drive, probably counting on someone using the same USB drive on both an unsecured and a secure computer. There are very secure air-gap manual switches that enable someone to have both computers on their desk and switch between them as needed. All it would take is for that person to get lazy and use the same USB drive on both machines. A REALLY secure computer has its USB ports filled with epoxy.

NWCorona

(8,541 posts)
10. Yeah you are right. that term can be viewed a few ways. That's why I left off the word "air"
Tue Aug 9, 2016, 02:48 PM
Aug 2016

In my view the way it fools secure systems is the most interesting and troubling part.

And definitely agree with you on the epoxy.

cstanleytech

(26,290 posts)
5. So was it depending on a physical USB drive or was it creating a
Tue Aug 9, 2016, 09:06 AM
Aug 2016

hidden virtual USB drive to survive on infected systems?

Igel

(35,300 posts)
6. Sounds like it was coopting part of a separate USB drive's memory.
Tue Aug 9, 2016, 10:10 AM
Aug 2016

You plug it in, the anti-malware software doesn't see this sequestered memory. The malware runs, infects the machine, and saves data to that reserved memory, undetected.

As soon as you plug the USB thumbdrive into a networked computer, the information can be transmitted. An uninfected drive plugged into an infected machine can be infected.

The air-gapped computer is now "networked" like the computers where I worked a long time ago was "networked": Engineers ran experiments, the data was recorded on magnetic tape, and somebody would have to schlep the tapes from the experiment site to the processing section. (Okay, this was '81.)

 

Plucketeer

(12,882 posts)
8. You can find examples
Tue Aug 9, 2016, 02:36 PM
Aug 2016

of some of the most vaunted automobiles in junkyards - ones that show no evidence of a collision being the cause of their demise. Nothing man-made is perfectly impervious.

Latest Discussions»Latest Breaking News»Researchers crack open un...