London, 11 June 2015 year: Eugene Kaspersky joins the
afternoon to perhaps the most difficult task since its founding
company. Before accumulated specialized press delivers a message
in which it is difficult to believe: the virus infiltrated the systems’
Kaspersky!
Advanced worm
Kaspersky trying to explain what happened: allegedly carried out
internal testing of prototype software to recognize the new
developed very sophisticated pests. Then had come
to detect the virus in their systems, which according
Kaspersky could become a model for new generation
Virus . Experts call them at a glance Apart from words Advanced
Persistent Threats, or advanced persistent threats.
Who’s behind them? – Special services or other institutions
State – corresponds to the Kaspersky virus expert. Did not want to
more to say about this, but some information can be read
between the lines: Kaspersky nadmieniał repeatedly that
Duqu worm is a development . And the Trojan won
already notoriety in 2011, when the company’s computers infected in
Europe and meticulously steal information from the system
industry. Many experts assume today that the Trojan derived
from the ranks of the Israeli special services.
According to Kaspersky his successor, Duqu 2.0 very precisely
retrieves information: interested mainly in state
development of the latest and future security and wants to know
Technical experts what strategies they want to use against
the latest ATP.
Economy and politics targeted
Further analysis showed that Kaspersky was not the only target.
The problem also applies to companies in Russia, countries of West Asia and the
Middle East. 2.0 Duqu was also sniffing around, even in circles
political. According to Kaspersky Duqu 2.0 activated during
nuclear negotiations Group 5 + 1 countries with Iran. In addition to this
the authors of the attack were interested in the commemoration of the anniversary of the liberation
Auschwitz Concentration Camp, and especially prominent
participants in the festivities.
Why is this pest is another
From the point of view of researchers viruses attack in this form is
hitherto unprecedented phenomenon. Their amazement sparked the fact that
The worm almost does not leave traces: do not leave on your hard
Disk files or change system settings. Embeds itself
only in memory. – If you unplug PC and
will cut it from its power, the Trojan disappears – says Kaspersky.
Duqu 2.0 is as Aliens, The Terminator and Predator
put together
Eugene Kaspersky, head of Kaspersky Labs
To enter the system, Duqu 2.0 used three vulnerabilities
Windows security at a time that has already been cleared by
Microsoft. For news about such rear wickets special services
and cybercriminals are paying large sums – is another clue
indicating that for Duqu 2.0 is a powerful
organization.
Is Kaspersky is still safe?
Regardless of who is behind the attack, users Company
Kaspersky arises one question: how safe are the solutions
the company’s anti-virus on your home PC? Is stolen
information about the mechanisms of protective security packages
guarding millions of computers around the world? Finally virus
He prevailed in January and until recently how much he could spy
your heart desires. Eugene Kaspersky rejects this possibility.
He says that issue does not affect customers, and that
the authors of the attack did not it was not . In addition to this
modern virus scanners already recognize Duqu 2.0.
Duqu code
2.0 exists only in memory. Currently Trojan
already recognize modern virus scanners.
Kaspersky trying to point out the positive aspects of the event,
arguing that as a result of the attack gained valuable knowledge in order to
improving the efficiency of their own products. – Attacked
us because we are the best – says Kaspersky.
Is it reassures customers? For not fully convinced solid
Readers Computer World from number 9/2015 is available
G DATA antivirus package for free for one year. This German company
He says that so far there are no clues pointing to
2.0 Duqu infection.
The fight exacerbated
The case Kaspersky shows that viruses have become powerful
weapon in the hands of special services and mark the beginning of a new era.
in which a digital arms race is becoming more dangerous.
Private users should also be afraid, because it’s just a matter of
the time when ordinary hackers learn to use the new
technologies for their benefits.
Being a victim, it’s easy to lose control
Ralf
Benzmüller, head of Security Labs at G DATA
Computer World : Do you explored your systems
for signs of Duqu 2.0?
Ralf Benzmüller : Regularly we examine our
systems for the presence of spy tools disclosed in the road
Special analysis. Duqu 2.0 so far not found.
Is the Lord known another case in which the company
IT security industry suffered an attack?
No, we do not know of another case.
Is the same company G Data has already been used
attacked?
Our servers – as well as third-party servers – still stand in
focus of hackers. So far, always effective
we managed to repel the attacks. Our employees are properly
vigilant and immediately report suspicious messages.
How do you assess the openness with which Kaspersky announced
about the case?
Who would have thought that this openness will be so well received
by public opinion? Evil tongues say, however, that infection
was a figment of the marketing department of Kaspersky.
Is the Lord’s point of view, Kaspersky can
completely ruled out theft of proprietary systems
security?
Being the victim of an attack charged therein precisely, it is easy to lose
control over what actually happened. It is very difficult then
formulate clear judgments.
“You can also read:
Cyberdżihad. Islamic terror on the Internet
No comments:
Post a Comment