Jump to content

Prolific Russian hackers using untraceable satellites to launch attacks


Recommended Posts

http://cdn.mos.techradar.com/art/mobile_phones/Carphone%20Warehouse/Safe%20phone/CBN09.safe.illo-470-75.jpg

Russian-speaking hackers have been using commercial satellites to mask malware attacks on western military and governmental networks in an escalation that has high-level security staff worried.

A report from Kaspersky Lab claims that the group behind the Ouroboros malware (also known as Snake or Turla) has been using commercial satellites to access hidden receiving stations in Africa and the Middle East

Satellites have been a favored front for cyber attacks on military and governmental networks in the West because they mask the location of the command and control servers that hackers use to issue instructions to malware on infected systems.

It exploits the fact that most communications being sent downstream from satellites to Earth are unencrypted and therefore vulnerable to spoofing. Even though there are a number of further steps involved, the escalation of this method has members of the security community concerned.

"We in security are always accused of spreading FUD, but this is the reality of the connected world we live in." said TK Keanini, CTO at Lancope, a company specialising in flow analytics for security and network performance monitoring. "These are talented well-funded threat actors whose job it is to not make the news; so when one does, consider them the sloppy ones."

It's also incredibly hard to trace this kind of attack as the trail often dies quickly and trying to stop it completely is also proving incredibly tricky.

Only one way to stop it

"Using a cloned modem makes it harder for ISPs to block the traffic since it would impact legitimate users," added Ian Pratt, CEO and co-founder, Bromium, an endpoint protection and security firm. "The miscreants can simply switch to cloning a different legitimate user's device."

"Strong authentication of access modems using a key unique to each device is the only way to block this kind of attack, but can only realistically be done for new deployments," he said.

With governmental organisations, embassies and firms in Russia, China and a dozen other countries targeted plus research groups and medical firms, the security community is right to be worried about this method of spreading malware.




http://rc.feedsportal.com/r/238385598917/u/49/f/415085/c/669/s/49bc1f43/sc/7/rc/1/rc.img

http://rc.feedsportal.com/r/238385598917/u/49/f/415085/c/669/s/49bc1f43/sc/7/rc/2/rc.img

http://rc.feedsportal.com/r/238385598917/u/49/f/415085/c/669/s/49bc1f43/sc/7/rc/3/rc.img

http://da.feedsportal.com/r/238385598917/u/49/f/415085/c/669/s/49bc1f43/sc/7/a2.imghttp://pi.feedsportal.com/r/238385598917/u/49/f/415085/c/669/s/49bc1f43/sc/7/a2t.imghttp://rss.feedsportal.com/c/669/f/415085/s/49bc1f43/sc/7/mf.gifhttp://feeds.feedburner.com/~r/techradar/software-news/~4/prDjHVA1O6w
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...