Budapest Post

Cum Deo pro Patria et Libertate
Budapest, Europe and world news

Snake - Russia's Most Advanced Cyber Espionage Tool And Why It's So Dangerous

Snake - Russia's Most Advanced Cyber Espionage Tool And Why It's So Dangerous

The malware in question is Snake, a cyber espionage tool deployed by Russia's Federal Security Service that has been around for about 20 years.

Like most people I check my emails in the morning, wading through a combination of work requests, spam and news alerts peppering my inbox.

But yesterday brought something different and deeply disturbing. I noticed an alert from the American Cybersecurity and Infrastructure Security Agency (CISA) about some very devious malware that had infected a network of computers.

The malware in question is Snake, a cyber espionage tool deployed by Russia's Federal Security Service that has been around for about 20 years.

According to CISA, the Snake implant is the “most sophisticated cyber espionage tool designed and used by Center 16 of Russia's Federal Security Service for long-term intelligence collection on sensitive targets”.


The stealthy Snake


The Russian Federal Security Service developed the Snake network in 2003 to conduct global cyber espionage operations against NATO, companies, research institutions, media organisations, financial services, government agencies and more.

So far, it has been detected on Windows, Linux and macOS computers in more than 50 countries, including Australia.

Elite Russian cyber espionage teams put the malware on a target's computer, copy sensitive information of interest and then send it to Russia. It's a simple concept, cloaked in masterful technical design.

Since its creation, Russian cyber spies have regularly upgraded the Snake malware to avoid detection. The current version is cunning in how it persistently evades detection and protects itself.

Moreover, the Snake network can disrupt critical industrial control systems that manage our buildings, hospitals, energy systems, water and wastewater systems, among others – so the risks went beyond just intelligence collection.

There are warnings that in a couple of years bad actors may gain the capability to hijack critical Australian infrastructure and cause unprecedented harm by interfering with physical operations.

Snake hunting


On May 9, the US Department of Justice announced the Federal Bureau of Investigation had finally disrupted the global Snake peer-to-peer network of infected computers.

The covert network allowed infected computers to collect sensitive information. The Snake malware then disguised the sensitive information through sophisticated encryption, and sent it to the spy masters.

Since the Snake malware used custom communication protocols, its covert operations remained undetected for decades. You can think of custom protocols as a way to transmit information so it can go undetected.

However, with Russia's war in Ukraine and the rise in cybersecurity activity over the past few years, the FBI has increased its monitoring of Russian cyber threats.

While the Snake malware is an elegantly designed piece of code, it is complex and needs to be precisely deployed to avoid detection. According to the Department of Justice's press release, Russian cyber spies were careless in more than a few instances and did not deploy it as designed.

As a result, the Americans discovered Snake, and crafted a response.


Snake bites


The FBI received a court order to dismantle Snake as part of an operation code-named MEDUSA.

They developed a tool called PERSEUS that causes the Snake malware to disable itself and stop further infection of other computers. The PERSEUS tool and instructions are freely available to guide detection, patching and remediation.

The Department of Justice advises that PERSEUS only stops this malware on computers that are already infected; it does not patch vulnerabilities on other computers, or search for and remove other malware.

Even though the Snake network has been disrupted, the department warned vulnerabilities may still exist for users, and they should follow safe cybersecurity hygiene practices.


Snake bite treatment


Fortunately, effective cybersecurity hygiene isn't overly complicated. Microsoft has identified five activities that protect against 98% of cybersecurity attacks, whether you're at home or work.

1. Enable multi-factor authentication across all your online accounts and apps. This login process requires multiple steps such as entering your password, followed by a code received through a SMS message – or even a biometric fingerprint or secret question (favourite drummer? Ringo!).

2. Apply “zero trust” principles. It's best practice to authenticate, authorise and continuously validate all system users (internal and external) to ensure they have the right to use the systems. The zero trust approach should be applied whether you're using computer systems at work or home.

3. Use modern anti-malware programs. Anti-malware, also known as antivirus software, protects and removes malware from our systems, big and small.

4. Keep up to date. Regular system and software updates not only help keep new applications secure, but also patch vulnerable areas of your system.

5. Protect your data. Make a copy of your important data, whether it's a physical printout or on an external device disconnected from your network, such as an external drive or USB.

Like most Australians, I have been a victim of a cyberattack. And between the recent Optus data breach and the Woolworths MyDeal and Medibank attacks, people are catching on to just how dire the consequences of these events can be.

We can expect malicious cyberattacks to increase in the future, and their impact will only become more severe. The Snake malware is a sophisticated piece of software that raises yet another concern. But in this case, we have the antidote and can protect ourselves by proactively following the above steps.

If you have concerns about the Snake malware you can read more here, or speak to the fine folks at your IT service desk.The Conversation

AI Disclaimer: An advanced artificial intelligence (AI) system generated the content of this page on its own. This innovative technology conducts extensive research from a variety of reliable sources, performs rigorous fact-checking and verification, cleans up and balances biased or manipulated content, and presents a minimal factual summary that is just enough yet essential for you to function as an informed and educated citizen. Please keep in mind, however, that this system is an evolving technology, and as a result, the article may contain accidental inaccuracies or errors. We urge you to help us improve our site by reporting any inaccuracies you find using the "Contact Us" link at the bottom of this page. Your helpful feedback helps us improve our system and deliver more precise content. When you find an article of interest here, please look for the full and extensive coverage of this topic in traditional news sources, as they are written by professional journalists that we try to support, not replace. We appreciate your understanding and assistance.
Newsletter

Related Articles

Budapest Post
Close
0:00
0:00
The Fed fixing the economy
Corporations standing up for “LGDP-LGT-LBG-LGBTQ2+ kids” during ‘Pride Month’ be like:
A Major Ukrainian Hydroelectric Dam BLOWN UP
US and European Intelligence Agencies Uncover Evidence of Ukrainian Role in Terror Attack on Nord Stream Pipeline
The driver has been described by authorities as a 21-year-old woman from Tallahassee
Joe Biden falls at the Air Force Graduation
America's Got Talent…
Nvidia Joins Tech Giants as First Chipmaker to Reach $1 Trillion Valuation
Drone Attack on Moscow's Wealthiest Neighborhoods Suspected to be Launched by Ukraine
UK Prime Minister Rishi Sunak to Hold Power Talks with President Biden in Washington
AI ‘extinction’ should be same priority as nuclear war – experts
Prominent Hacker Forum RaidForums Suffers Substantial Data Breach
Climate cultists thought they had sabotaged another beautiful event — then the cameraman had his revenge.
Nvidia CEO Huang says firms, individuals without AI expertise will be left behind
WPP Revolutionizes Advertising with NVIDIA's AI Powerhouse
Two US Employees Fired For Chasing Robbers Out Of Store As They Broke ''Company Policy''
Pfizer, the EU, and disappearing ink - Smoke, Mirrors, and the Billion-Dose Pfizer Vaccine Deal: EU's 'Open Secret
Actor Tom Hanks told Harvard University graduates to be superheroes in their defense of truth and American ideals, and to resist those who twist the truth for their own gain
A provocative study suggests: Left-Wing Extremism and its Unsettling Connection to Psychopathy and Narcissism
France Arrests 10 on Suspicion of Failing to Respond in Time to Migrant Drowning
Neuralink Receives FDA Approval for First-in-Human Clinical Study
Is Saudi Arabia the holiest place in the world? Ancient Hebrew Inscriptions from "The Mount Sinai Stand" Discovered in Saudi Arabia
Ukrainian Intelligence Official Admits to Assassination Attempts on Putin
WATCH THIS: democracy in Russia is so bad!
Ed Davey: It is possible for a woman to have a penis
Bernard Arnault Loses $11.2 Billion in One Day as Investors Fear Slowdown in US Growth Will Reduce Demand for Luxury Products
Russian’s Wagner Group leader: “I am not a chef, I am a butcher. Russia is in danger of a revolution like in 1917.”
TikTok Sues Montana Over Law Banning the App
Ron DeSantis Jumps Into 2024 Presidential Race, Setting Up Showdown With Trump
Steve Jobs introducing Apple's iPhone, exactly 16 years ago.
China overtakes Japan as world's top car exporter
Elon Musk's SpaceX and Italy's Unipol join forces to help Italians hit by flooding
Talks between US House Republicans and President Biden's Democratic administration on raising the federal government's $31.4tn debt ceiling have paused
Syrian President Bashar al-Assad received a warm welcome at an Arab summit in Jeddah
Biden Administration Eyeing High-Profile Visits to China: The Biden Administration is heating things up by looking into setting up a series of top-level visits to Beijing by top officials in the coming months
New evidence in special counsel probe may undercut Trump’s claim documents he took were automatically declassified
A French court of appeals confirmed former President Nicolas Sarkozy's three-year jail term for corruption and influence peddling
Debt Ceiling Crises Have Unleashed Political Chaos
Weibao Wang, a former software engineer at Apple, was charged with stealing trade secrets related to autonomous systems, including self-driving cars
Mobile phone giant Vodafone to cut 11,000 jobs globally over three years as new boss says its performance not good enough
Elon Musk compares George Soros to Magneto, the supervillain from the Marvel Comics series.
Warren Buffett Sells TSMC Shares Over Concerns About Taiwan's Stability
New Study Finds That Secondary Bacterial Pneumonia Is a Major Cause of Death in COVID-19 Patients Who Require Ventilator Assistance
Vienna: Passenger Plays Hitler Speeches on Train, Causes Panic
The official tapes of Trump's deposition in the E. Jean Carroll battery (rape) and defamation case have been released.
King Charles III being crowned.
Newly released video of Donald Trump’s rape trial deposition:
Video: Ukraine MP Punches Russian Representative At Global Meet
El Paso mayor has declared a state of emergency
Russia accused Ukraine of attacking the Kremlin with drones in an attempt to kill Putin
×