How the US dismantled a malware network used by Russian spies to steal government secrets

FBI tracked the cyber-espionage malware for close to two decades


The U.S. government said it has disrupted a long-running Russian cyber espionage campaign that stole sensitive information from the U.S. and NATO governments, an operation that took the feds almost 20 years,

The Justice Department announced on Tuesday that an FBI operation successfully dismantled the “Snake” malware network used by Turla, a notorious hacking group long affiliated with Russia’s Federal Security Service (FSB). Turla was previously linked to cyberattack targeting U.S. Central Command, NASA, and the Pentagon.

U.S. officials describe Snake as the “most sophisticated cyber espionage tool in the FSB’s arsenal”.

The DOJ and its global partners identified the Snake malware in hundreds of computer systems in at least 50 countries. Prosecutors said the Russian spies behind the Turla group used the malware to target NATO member states — and other targets of the Russian government — as far back as 2004.

In the United States, the FSB used its sprawling network of Snake-infected computers to target industries including education, small businesses and media organizations, along with critical infrastructure sectors including government facilities, financial services, manufacturing and communications. The FBI said it obtained information indicating that Turla had also used Snake malware to target the personal computer of a journalist at an unnamed U.S. news media company who had reported on the Russian government.

Prosecutors added that Snake persists on a compromised computer’s system “indefinitely,” despite efforts by the victim to neutralize the infection.

After stealing sensitive documents, Turla exfiltrated this information through a covert peer-to-peer network of Snake-compromised computers in the U.S. and other countries, the DOJ said, making the network’s presence harder to detect.

From Brooklyn to Moscow

According to the FBI’s affidavit, U.S. authorities monitored the malware’s spread for several years, along with the Turla hackers who operated Snake from FSB facilities in Moscow and the nearby city of Ryazan.

The FBI said it developed a tool called “Perseus” — the Greek hero who slayed monsters — that allowed its agents to identify network traffic that the Snake malware had tried to obfuscate.

Between 2016 and 2022, FBI officials identified the IP addresses of eight compromised computers in the U.S., located in California, Georgia, Connecticut, New York, Oregon, South Carolina and Maryland. (The FBI said it also alerted local authorities to take down Snake infections on compromised machines located outside of the United States.)

With the victim’s consent, the FBI obtained remote access to some of the compromised machines and monitored each for “years at a time.” This allowed the FBI to identify other victims in the Snake network, and to develop capabilities to impersonate the Turla operators and issue commands to the Snake malware as if the FBI agents were the Russian hackers.

Then this week, after obtaining a search warrant from a federal judge in Brooklyn, New York, the FBI was given the green light to mass-command the network to shut down.

The FBI used its Perseus tool to mimic Snake’s built-in commands, which when transmitted by Perseus from an FBI computer, “will terminate the Snake application and, in addition, permanently disable the Snake malware by overwriting vital components of the Snake implant without affecting any legitimate applications or files on the subject computers.”

The affidavit said the FBI used Perseus to trick the Snake malware to self-delete itself on the very computers it had infected. The FBI says it believes this action has permanently disabled the Russian-controlled malware on infected machines and will neutralize the Russian government’s ability to further access the Snake malware currently installed on the compromised computers.

The feds warned that if it hadn’t taken action to dismantle the malware network when it did, the Russian hackers could have learned “how the FBI and other governments were able to disable the Snake malware and harden Snake’s defenses.”

While the FBI has disabled the Snake malware on compromised computers, the DOJ warned that the Russian hackers could still have access to compromised machines, since the operation did not search for or remove any additional malware or hacking tools that the hackers may have placed on victim networks. The feds also warned that Turla frequently deploys a “keylogger” on victims’ machines to steal account authentication credentials, such as usernames and passwords, from legitimate users.

U.S. cybersecurity agency CISA launched a 48-page joint advisory to help defenders detect and remove Snake malware on their networks.

Read more:

Source link

Leave a Reply

Your email address will not be published. Required fields are marked *


Gary Vaynerchuk: NFTs will go beyond being just collectibles

Welcome back to Chain Reaction, a podcast that unpacks and dives deep into the latest trends, drama and news with some of the biggest names in crypto breaking things down block by block for the crypto curious. For this week’s episode, Jacquelyn interviewed Gary Vaynerchuk, better known as Gary Vee. He is the chairman of […]

Read More

Tesla says all new Model 3s now qualify for full $7,500 tax credit

ADVERTISEMENT All new Tesla Model 3 vehicles will now qualify for the full $7,500 federal EV tax credit, according to a change in Tesla’s website. The EV tax credits were mandated by Congress last August as part of the Inflation Reduction Act, with the goal of ending U.S. reliance on China for batteries. The full $7,500 […]

Read More

T. Rowe Price has marked down its stake in Canva by 67.6%

Last summer, Blackbird, one of Australia’s largest venture operations, marked down the value of one of its most prized stakes, in the Sydney-based design platform Canva. Valued at $40 billion by investors in a $200 million round in the fall of 2021, Blackbird adjusted its own valuation of the company 36% to $25.6 billion. Now, […]

Read More
ankara escort çankaya escort çankaya escort escort bayan çankaya istanbul rus escort eryaman escort ankara escort kızılay escort istanbul escort ankara escort ankara escort escort ankara istanbul rus Escort atasehir Escort beylikduzu Escort Ankara Escort malatya Escort kuşadası Escort gaziantep Escort izmir Escort