Explore the latest news and trends  

Sign up for our weekly security newsletter


Be the first to receive important updates on security





Send

Russian Government Responsible for Malicious Program ‘Uroburos,’ States G Data

According to G Data Security, the anti-virus detection and computer security firm based in Germany, a malware program just discovered and called "Uroburos" is the responsibility of Russian government.

On February 28, 2014, G Data posted elaborately about Uroburos, however, did not state regarding the whereabouts of the same. The firm explains that the malware is extremely sophisticated and complex and is created for filching confidential data. It aims at penetrating massive networks with the help of a P2P infrastructure for accessing as well as filching databases even from computers which do not actually function as servers.

This way, Uroburos utilizes a server, which has been infected, like one command and control system for gathering secret data held on the victimized network prior to transmitting all the stolen data onto the Internet-connected systems the attackers run. Moreover, Uroburos contains a rootkit component along with one encoded virtual file, while being extremely modular that gives the mentioned extremely sophisticated nature to it, as well as is extremely flexible and perilous, states G Data. According to the firm, Uroburos' driver has a highly complicated design which makes it utterly distinct and hard for detecting.

G Data acts cautiously, avoiding specifying that Russian intelligence agents developed Uroburos; however, clearly suggests that the company is sure about what it reveals.

There are dual clues as to why G Data believes Uroburos has a Russian connection. First, the Uroburos creators apparently speak Russian language. Second, the malware quite resembles Agent.BTZ the program Russia allegedly utilized for launching cyber assaults during 2008 against USA.

The security company outlined that Uroburos checked if Agent.BTZ was present, while if it was there, Uroburos would stay dormant.

Meanwhile, Rootkit Uroburos' earliest driver was designed some years ago during 2011 which implies that it had remained unidentified for 3-yrs or so. Such is perhaps an extremely embarrassing assertion done regarding the malicious program.

Unfortunately, thirst for details continues. Nothing is known about the way Uroburos may contaminate users' PCs, albeit personalized e-mail assaults and USB contamination appear possible, alternatively which targets may've got victimized else what data may've got seized.

» SPAMfighter News - 3/8/2014

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page
Next