Attacks linked to the National Security Agency have been going on for up to 15 years, and targeted Islamic scholars and encryption firms as well as governments and high-profile companies.
The US security services have developed software that has enabled it to spy on home computers almost anywhere in the world.
Russian researchers at Kaspersky Lab have claimed that the software gave those behind it, thought to be the US National Security Agency, the power to listen in on the majority of the world’s computers.
It could be installed on practically any of the world's most common hard drives and spy on the computer while going undetected.
It was used to break in to government and other important institutions in 30 countries across the world, they claim.
Kaspersky Lab, the computer security firm that discovered the software, refused to name the country that the spying came from. But it said that it was closely related to Stuxnet, an NSA-led cyberweapon that was used in an attack on an Iranian nuclear facility.
The group was using some of the same exploits to get into computers that were used in the Stuxnet attack, even before they had been publicly exposed. That has led to many in the information security community to assume that the group behind it are either part of the NSA, or linked to the US intelligence agencies.
Instead, Kaspersky referred to the group behind the attack as the Equation group, because of the encryption used in its attacks. The group has been active since at least 2001, experts said, and “is probably one of the most sophisticated cyber attack groups in the world”, Kaspersky said in its report.
The group’s tools are complicated and expensive to develop, the report said. They are used to infect victims and steal their data, and are developed to go unnoticed.
Most of the tools are Trojans, which are implanted secretly on users’ computers and then give the group access to them.
Once a drive is infected, the only way to remove it is to destroy the drive physically.
The group has used the software to infect thousands, or perhaps tens of thousands, of victims, Kaspersky said. It was used on computers in the US, UK, Italy, Germany, the Netherlands and many other countries.
As well as governments, the software was used to attack Islamic scholars and activists, media organisations and aerospace, energy and nuclear research companies. It was also used on companies that are developing encryption software that can keep users from similar attacks.
The software uses an infrastructure built out of 100 servers and 300 domains, distributed across the world.
Kaspersky published the details of its research last night, in the hope of allowing institutions to guard against the attacks in future.
© independent.co.uk
It could be installed on practically any of the world's most common hard drives and spy on the computer while going undetected.
It was used to break in to government and other important institutions in 30 countries across the world, they claim.
Employees work at the headquarters of Kaspersky Labs, a company which specialises in the production of antivirus and internet security software
Kaspersky Lab, the computer security firm that discovered the software, refused to name the country that the spying came from. But it said that it was closely related to Stuxnet, an NSA-led cyberweapon that was used in an attack on an Iranian nuclear facility.
The group was using some of the same exploits to get into computers that were used in the Stuxnet attack, even before they had been publicly exposed. That has led to many in the information security community to assume that the group behind it are either part of the NSA, or linked to the US intelligence agencies.
Instead, Kaspersky referred to the group behind the attack as the Equation group, because of the encryption used in its attacks. The group has been active since at least 2001, experts said, and “is probably one of the most sophisticated cyber attack groups in the world”, Kaspersky said in its report.
The group’s tools are complicated and expensive to develop, the report said. They are used to infect victims and steal their data, and are developed to go unnoticed.
Most of the tools are Trojans, which are implanted secretly on users’ computers and then give the group access to them.
Once a drive is infected, the only way to remove it is to destroy the drive physically.
The group has used the software to infect thousands, or perhaps tens of thousands, of victims, Kaspersky said. It was used on computers in the US, UK, Italy, Germany, the Netherlands and many other countries.
As well as governments, the software was used to attack Islamic scholars and activists, media organisations and aerospace, energy and nuclear research companies. It was also used on companies that are developing encryption software that can keep users from similar attacks.
The software uses an infrastructure built out of 100 servers and 300 domains, distributed across the world.
Kaspersky published the details of its research last night, in the hope of allowing institutions to guard against the attacks in future.
© independent.co.uk
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.