Mysterious Hackers Hid Their Swiss Army Spyware for 5 Years

Even rarer is the emergence of one whose spyware has 80 distinct components, capable of strange and unique cyberespionage tricksand who's kept those tricks under wraps for more than five years.

In a talk at the Kaspersky Security Analyst Summit in Singapore Wednesday, Kaspersky security researcher Alexey Shulmin revealed the security firm's discovery of a new spyware frameworkan adaptable, modular piece of software with a range of plugins for distinct espionage tasksthat it's calling TajMahal. The TajMahal framework's 80 modules, Shulmin says, comprise not only the typical keylogging and screengrabbing features of spyware, but also never-before-seen and obscure tricks.It can intercept documents in a printer queue, and keep track of "files of interest," automatically stealing them if a USB drive is inserted into the infected machine.

"Such a large set of modules tells us that this APT is extremely complex," Shulmin wrote in an email interview ahead of his talk, using the industry jargonshort for advanced persistent threatto refer to a sophisticated hackers who maintain long-term and stealthy access to victim networks.

Kaspersky says it first detected the TajMahal spyware framework last fall, on only a single victim's network: The embassy of a Central Asian country whose nationality and location Kaspersky declines to name. "This suggests that there are either further victims not yet identified, or additional versions of this malware in the wild, or possibly both."

Those initial findings may indicate a very cautious and discreet state-sponsored intelligence-gathering operation, says Jake Williams, a former member of the National Security Agency's elite Tailored Access Operations hacking group.

He points out also that the ability to avoid detection and the single known victim suggest extreme care in targeting, stealth, and operation security.

But the compile times of various elements of TajMahalthe time stamps that indicate when a piece of it was programmedindicate it was active both before and long after that date.

Original article
Author: Wired

Wired has recently written 8 articles on similar topics including :
  1. "On Wednesday, Mark Zuckerberg laid out a vision for a very different Facebook—with a lot of unknowns about how to get there". (March 7, 2019)
  2. "For the past four years, Facebook has quietly used a homegrown tool called Zoncolan to find bugs in its massive codebase". (August 17, 2019)
  3. "The idea that FaceApp is somehow exceptionally dangerous threatens to obscure the real point: All apps deserve this level of scrutiny". (July 17, 2019)
  4. "Who needs the dark web? Researchers found 74 groups offering stolen credit cards and hacking tools by conducting simple Facebook searches". (April 5, 2019)
  5. "An exposed database belonging to Verifications.io contained both personal and business information, including 763 million unique email addresses". (March 7, 2019)
  6. "New research shows how nearby attackers can see where you are, send you spoofed carrier messages, and more". (February 26, 2019)
  7. "Opinion: Utah legislators recently voted to pass landmark legislation in support of a new privacy law. Statehouses across the country should take notes". (March 22, 2019)
  8. "The one-day pop-up kiosk is meant to show that Facebook takes users’ privacy concerns seriously. It also was an opportunity to gather more data". (December 14, 2018)
Posted on  , , , ,