Monday, August 31, 2015

The attack on Kaspersky – PC World

London, 11 June 2015 year: Eugene Kaspersky joins the
 afternoon to perhaps the most difficult task since its founding
 company. Before accumulated specialized press delivers a message
 in which it is difficult to believe: the virus infiltrated the systems’
 Kaspersky!



Advanced worm

Kaspersky trying to explain what happened: allegedly carried out
 internal testing of prototype software to recognize the new
 developed very sophisticated pests. Then had come
 to detect the virus in their systems, which according
 Kaspersky could become a model for new generation
 Virus
. Experts call them at a glance Apart from words Advanced
 Persistent Threats, or advanced persistent threats.

Who’s behind them? – Special services or other institutions
 State
– corresponds to the Kaspersky virus expert. Did not want to
 more to say about this, but some information can be read
 between the lines: Kaspersky nadmieniał repeatedly that
 Duqu worm is a development
. And the Trojan won
 already notoriety in 2011, when the company’s computers infected in
 Europe and meticulously steal information from the system
 industry. Many experts assume today that the Trojan derived
 from the ranks of the Israeli special services.

According to Kaspersky his successor, Duqu 2.0 very precisely
 retrieves information: interested mainly in state
 development of the latest and future security and wants to know
 Technical experts what strategies they want to use against
 the latest ATP.

Economy and politics targeted

Further analysis showed that Kaspersky was not the only target.
 The problem also applies to companies in Russia, countries of West Asia and the
 Middle East. 2.0 Duqu was also sniffing around, even in circles
 political. According to Kaspersky Duqu 2.0 activated during
 nuclear negotiations Group 5 + 1 countries with Iran. In addition to this
 the authors of the attack were interested in the commemoration of the anniversary of the liberation
 Auschwitz Concentration Camp, and especially prominent
 participants in the festivities.

Why is this pest is another

From the point of view of researchers viruses attack in this form is
 hitherto unprecedented phenomenon. Their amazement sparked the fact that
 The worm almost does not leave traces: do not leave on your hard
 Disk files or change system settings. Embeds itself
 only in memory. – If you unplug PC and
 will cut it from its power, the Trojan disappears – says Kaspersky.

Duqu 2.0 is as Aliens, The Terminator and Predator
 put together

Eugene_Kaspersky _-_ Kaspersky_Lab.jpg Eugene Kaspersky, head of Kaspersky Labs

To enter the system, Duqu 2.0 used three vulnerabilities
 Windows security at a time that has already been cleared by
 Microsoft. For news about such rear wickets special services
 and cybercriminals are paying large sums – is another clue
 indicating that for Duqu 2.0 is a powerful
 organization.

Is Kaspersky is still safe?

Regardless of who is behind the attack, users Company
 Kaspersky arises one question: how safe are the solutions
 the company’s anti-virus on your home PC? Is stolen
 information about the mechanisms of protective security packages
 guarding millions of computers around the world? Finally virus
 He prevailed in January and until recently how much he could spy
 your heart desires. Eugene Kaspersky rejects this possibility.
 He says that issue does not affect customers, and that
 the authors of the attack did not it was not
. In addition to this
 modern virus scanners already recognize Duqu 2.0.

KL_Screenshot_Duqu_2.jpg Duqu code
 2.0 exists only in memory. Currently Trojan
 already recognize modern virus scanners.

Kaspersky trying to point out the positive aspects of the event,
 arguing that as a result of the attack gained valuable knowledge in order to
 improving the efficiency of their own products. – Attacked
 us because we are the best
– says Kaspersky.

Is it reassures customers? For not fully convinced solid
 Readers Computer World from number 9/2015 is available
 G DATA antivirus package for free for one year. This German company
 He says that so far there are no clues pointing to
 2.0 Duqu infection.

The fight exacerbated

The case Kaspersky shows that viruses have become powerful
 weapon in the hands of special services and mark the beginning of a new era.
 in which a digital arms race is becoming more dangerous.
 Private users should also be afraid, because it’s just a matter of
 the time when ordinary hackers learn to use the new
 technologies for their benefits.

Being a victim, it’s easy to lose control

 Ralf_Benzm & # XFC; ller, _G_DATA.jpg Ralf
 Benzmüller, head of Security Labs at G DATA

Computer World : Do you explored your systems
 for signs of Duqu 2.0?

Ralf Benzmüller : Regularly we examine our
 systems for the presence of spy tools disclosed in the road
 Special analysis. Duqu 2.0 so far not found.

Is the Lord known another case in which the company
 IT security industry suffered an attack?

No, we do not know of another case.

Is the same company G Data has already been used
 attacked?

Our servers – as well as third-party servers – still stand in
 focus of hackers. So far, always effective
 we managed to repel the attacks. Our employees are properly
 vigilant and immediately report suspicious messages.

How do you assess the openness with which Kaspersky announced
 about the case?

Who would have thought that this openness will be so well received
 by public opinion? Evil tongues say, however, that infection
 was a figment of the marketing department of Kaspersky.

Is the Lord’s point of view, Kaspersky can
 completely ruled out theft of proprietary systems
 security?

Being the victim of an attack charged therein precisely, it is easy to lose
 control over what actually happened. It is very difficult then
 formulate clear judgments.

“You can also read:
 Cyberdżihad. Islamic terror on the Internet

LikeTweet

No comments:

Post a Comment