Technology

Slingshot malware attacks through routers and remained undetected for six years

Researchers at Kaspersky Lab have discovered a new malware dubbed Slingshot, that remained undetected for six years, and they describe it as the most advanced malware to date. It infected 100 computers worldwide and also include few government institutions. Most of the victims seem to be targeted individuals and spread majorly across various countries like Kenya and Yemen and also in Afghanistan, Libya, Congo, Jordan, Turkey, Iraq, Sudan, Somalia, and Tanzania. It is not clear about the creators of this malware even though some clear English messages pointed out that the developers spoke the language. It is perceived as state-sponsored espionage to keep track of the terrorist activities, but it is not clear. Although the mode of infection is not entirely clear, the main target seems to be the MicroTik routers manufactured by Latvia.

Advertisement

How does the Slingshot malware infect PCs?

The malware initially replaces a library file with a malicious version that downloads other malicious components and cleverly launches a two-layered attack on the Personal computer (PC). One of them called the Cadhr runs a low-level code that gives access to storage and memory. The other one dubbed the Gollum app includes code that manages the file system and keeps the malware active. Kaspersky researchers describe these two as masterpieces and probably the reason behind the malware to remain undetected for such a long period.

Also Read: Google AI allows YouTube creators change video background ditching green screen

How slingshot succeeded in escaping from detection by Antivirus?

Slingshot malware employed an interesting strategy that led to it being successfully operational without being detected by the Antivirus engines. Slingshot stores all its files using an encrypted virtual file system and remained hidden in the unused part of the hard drive. By isolating itself from the computer file system, it was undetected by the search engines. The malware also can intelligently shut down its operations to escape detection from forensic tools. Slingshot steals whatever the information it needs like log activity, passwords screenshots, keyboard strokes and network traffic. There is also a possibility that apart from MicroTik, other routers might also be the victims of this malware. If that is the case, Slingshot might have far reach than the listed countries.

Source

Sekhar. M

Always on the move with the latest happenings in the field of technology and health. When I am not writing, you can find me listening to the latest chartbusters. Also being a sports geek, I always keep a close eye on all the latest happenings.

Share
Published by
Sekhar. M

Recent Posts

78cm Modular Electric Car iEV Z Changes Size as per the Need

iEV motors from Denmark has manufactured a pod-sized 78 cm iEV Z modular electric car.…

3 years ago

Updated Garena free fire redeem codes today new: How to redeem Ff rewards?

Garena free fire - Illuminate is a multiplayer battle royal mobile game. The app is…

3 years ago

Top 11 Ways to Keep Your Brain Healthy and Young

The stressors of adult life can take a serious toll on your brain and make…

3 years ago

Top Men Body Hair Removal Methods-2021

Men often experience a lot of irritation and embarrassment due to the unwanted growth of…

3 years ago

Microservices vs Monolithic architecture, Which is right for your Business?

Web application architecture describes the relationship between servers, databases and applications. All web applications are…

4 years ago

How Mobile Apps are Revolutionizing The Media And Entertainment Industry

Gone are the days when mobile phones come in handy only for voice calling and…

4 years ago