Spreading of Super-Resistant Malware- NSA has been suspected


Posted March 2, 2015 by julialloyds45

Kaspersky Lab has discovered the most sophisticated way of malware ever. The creator of the malware has dubbed “The Equation Group,”

 
[b]Kaspersky Lab[/b] has discovered the most sophisticated way of malware ever. The creator of the malware has dubbed The Equation Group, has used the never seen before tactic to infect for infecting the hard drives firmware.

By this technique the makers of the traditional antivirus and antimalware software has become practically useless. Most of the attacks are hit by the Windows PCs and Mac OS X users of China and also has hit the iOS which has become vulnerable as well.

[b]The Sum of Equation”s Parts[/b]

This equation has targeted at least 500 victims and more than 30 countries. It includes the government and diplomatic institutions, Islamic activists and scholars, aerospace, energy, nuclear research, the military, and companies in the telecommunications, oil and gas, transportation, mass media, financial, cryptography and nanotechnology industries.
However the visitors of certain ISPs of Jordan, Turkey and Egypt are off its list of targets. This equation has been severally used on different platforms over 14 years: EquationDrug and Equestre, very complex attack platforms which can dynamically uploaded and unloaded the DoubleFantasy Trojan. The TripleFantasy full-featured backdoor, Grayfish, that resides complete registry that relies on the bootkit for executing the OS starts up, Fanny, a computer worm which was createf that used to hit the targets in the Middle East and Asia; and EquationLaser.

This group used various techniques that include the Fanny self-replicating worm code, CD-ROMs, USB sticks and Web exploits. It even used the RC5 and RC6 encryption algorithms, as well as simple XOR, substitution tables, RC4 and AES encryption. This code was written in 2008 and thus it is likely that there are more sophisticated attacks under way today.

[b]NSA Runs Amok Again[/b]

This equation has hit some of the initial victims of the Stuxnet worm and believed to be created by the U.S. National Security Agency. This group of malware has been used for delivering the Stuxnet payload, Kaspersky speculated. However we can see the close connection between the Equation, Stuxnet and Flame groups.

This Equation discloses the huge cloud that is created over the U.S technology. Further the U.S is a target of it anyway and the damage to it is doing on the U.S tech segment that strategy that has become a greater liability than an asset.

[b]Every Thief Is a Rascal[/b]

The president of US has described this described cybersecurity breaches as serious acts of property damage and commercial theft and suggested the establishment of the international protocols for the government state sponsored cyberattacks.

This leads to a hollow tie in between the Equation and the NSA, because it makes the U.S untrustworthy. It makes it far harder for the administration to call out for abuse by the other states.

On the other such surveillance is necessary. The president has pointed the law enforcement to criticize the missing of attack or plot.

Meanwhile the cyberterrorism is growing. On the other hand on Tuesday the Kaspersky has announced the discovery of the Desert Falcons, the first known Arabic cyberespionage group that attacks the thousands of users globally.

[b]For More Information: [/b] http://www.combatpcviruses.com/nsa-suspected-spreading-of-super-resistant-malware
-- END ---
Share Facebook Twitter
Print Friendly and PDF DisclaimerReport Abuse
Contact Email [email protected]
Issued By julia lloyds
Country United States
Categories Technology
Tags doublefantasy trojan , equationdrug and equestre , ns asuspected of spreading malware , spreading superresistant malware , stuxnet worm , superresistant malware , the equation group
Last Updated March 2, 2015