Espionage Malware Penetrates Air-Gapped Networks

“Security researchers are warning that they’ve discovered a highly advanced and targeted cyber-espionage campaign that appears to have been running since 2011, and which remains active. The APT malware used by the group behind the campaign is remarkable in part not only for having remained undetected for so long, but also for its ability to exfiltrate data from air-gapped networks using multiple techniques, including by piggybacking on network protocols, researchers say.

Based on a reference to “Sauron” in the malware configuration files, the APT campaign has been dubbed “ProjectSauron” by Kaspersky Lab – referring to an all-seeing villain “The Lord of the Rings” – as well as “Strider” by Symantec, referring to a character who fights against Sauron.”

CHECK OUT THE FULL ARTICLE >>

Author: Mathew J. Schwartz, Data Breach TODAY