Super-Sophisticated Spyware Has Been Discovered After Undetected Five-Year Run

BY:

Sep 14, 2016

After spending a half-decade operating undetected, an APT (advanced persistent threat) known as “ProjectSauron” has been uncovered by both Symantec and Kaspersky Labs. A group called “Strider” has been using Remsec, an advanced tool that appears to have been designed for spying.

According to Symantec, the malware has been active since at least October 2011. Symantec became aware of ProjectSauron when their behavioural engineer detected the virus on a customer’s systems. Kaspersky’s software detected the malware in a Windows domain controller as an executable library registered as a Windows password filter.

advanced persistent threat

The spyware can deploy custom modules as required, and has a network monitor. Once it has infected a system, it can open backdoors, log keystrokes, and steal files. It is heavily encrypted, allowing it to avoid detection as it takes control, moving across the network and stealing data. As many of its functions are deployed over the network, it resides only in the computer’s memory, not on disk. This, along with the fact that several components are in the form of Binary Large Objects makes it extremely difficult for antivirus software to detect.

So far, evidence of a ProjectSauron infection has been detected in 36 computers by Symatec, spanning seven separate organizations in Russia, China, Sweden, and Belgium, as well as individual’s PCs in Russia. Kaspersky has found more than 30 infections across Russia, Iran, and Rawanda, and suspects that Italy may also have been targeted.

Both Symantec and Kaspersky have suggested that a nation-state may be behind this APT. Kaspersky has collected 28 domains and 11 IP addresses in the US and Europe that may be connected to ProjectSauron campaigns. While it appears that the spyware has gone dark, no one can confirm whether or not Strider’s efforts have ceased. If Strider is in fact a nation-state attacker, these infections will likely continue to crop up.

The fact that ProjectSauron operates by mimicking a password filter module is yet another indication that it may be time for technology users worldwide to move away from relying on passwords, favoring instead biometrics and other more sophisticated security measures.

Need more information on how to best protect your data, devices and business against malware? Contact {company} at {phone} or {email} with your questions. We’re the trusted IT professionals for businesses in {city}.

Related Blogs

  • active directory with amazon workspaces" alt="">
    Directory Services & User Authentication for Amazon WorkSpaces Deployment

    There are 6 common deployment scenarios for Active Directory Domain Services on AWS. Here’s how to handle each of them. Key Takeaways You can use an existing on-premises Microsoft Active Directory...

    Learn More
  • amazon workspaces monitoring and logging" alt="">
    Using Amazon CloudWatch to Monitor and Log Your Amazon WorkSpaces Deployment

    Use these best practices to monitor the health and connection status of individual Amazon WorkSpaces and deployments with Amazon CloudWatch Key Takeaways Organizations are increasingly using Amazon...

    Learn More
  • Amazon WorkSpaces Network and Virtual Private Cloud Configuration" alt="">
    Deploying Amazon WorkSpaces With the Right Network and VPC Configuration

    Know the network specifications and Amazon Virtual Private Cloud configurations you need to deploy Amazon WorkSpaces. Key Takeaways: Amazon WorkSpaces is a managed desktop cloud computing service...

    Learn More