Explore the latest news and trends  

Sign up for our weekly security newsletter

Be the first to receive important updates on security


Slingshot, an APT, Infects Via Routers


Kaspersky Lab researchers recently detailed one probable state-sponsored outbreak with an "Advanced Persistent Threat" which nothing could detect for 6-yrs until of late.


Known as "Slingshot" because the name is utilized within main code of the malicious program, the APT outbreak detected on March 9, understandably has been in operation from 2012 devoid of getting noticed. Slingshot that makes its place inside routers product of MikroTik a hardware maker from Latvia quite possibly was not spotted earlier as people accessing them are solely IT staff within business places. Upon causing infection, the connecting PC links up with one remote server for taking down the main Slingshot code which has dual modules - GollumApp and Cahnadr, both crafted for enabling data-theft.


Also according to the researchers, there's a series of tools as well as methodologies Slingshot uses for executing its assaults. However, the researchers couldn't determine what way Slingshot contaminated each and every target it aimed at, although within several instances, the targets were routers that were utilized like a springboard for hacking PCs inside a network. Itnews.com.au posted this, March 12, 2018.


It has been found that Slingshot effectively filches everything it wants, particularly passwords, network traffic, keyboard strokes and screenshots. It isn't definite what way the malware penetrates a PC other than exploiting a router management module; however, according to Kaspersky, there are many instances.


The company explains that Cahnadr, active within kernel mode, facilitates attackers with limitless control of the contaminated PC. Additionally, not as most malware which attempt at running within kernel mode, Cahnadr is able to run code devoid of letting one blue screen occur. GollumApp the other module happens to be still more sophisticated, having almost 1,500 user-code features.


Reportedly according to Kaspersky Lab, Slingshot is highly complicated, while those creating it have clearly given their plentiful time and funds for the development. The infection medium it uses is remarkable as well as it's aptly 'unique.'


It's time Slingshot is corrected like the latest updates for MikroTik router firmware. Worryingly, other router manufacturers too may get affected. Incase that's true it would mean Slingshot can spread wide while still collect critical data.

» SPAMfighter News - 3/14/2018

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page