Mysterious Hackers Hid Their Swiss Army Spyware for 5 Years

Even rarer is the emergence of one whose spyware has 80 distinct components, capable of strange and unique cyberespionage tricksand who's kept those tricks under wraps for more than five years.

In a talk at the Kaspersky Security Analyst Summit in Singapore Wednesday, Kaspersky security researcher Alexey Shulmin revealed the security firm's discovery of a new spyware frameworkan adaptable, modular piece of software with a range of plugins for distinct espionage tasksthat it's calling TajMahal. The TajMahal framework's 80 modules, Shulmin says, comprise not only the typical keylogging and screengrabbing features of spyware, but also never-before-seen and obscure tricks.It can intercept documents in a printer queue, and keep track of "files of interest," automatically stealing them if a USB drive is inserted into the infected machine.

"Such a large set of modules tells us that this APT is extremely complex," Shulmin wrote in an email interview ahead of his talk, using the industry jargonshort for advanced persistent threatto refer to a sophisticated hackers who maintain long-term and stealthy access to victim networks.

Kaspersky says it first detected the TajMahal spyware framework last fall, on only a single victim's network: The embassy of a Central Asian country whose nationality and location Kaspersky declines to name. "This suggests that there are either further victims not yet identified, or additional versions of this malware in the wild, or possibly both."

Those initial findings may indicate a very cautious and discreet state-sponsored intelligence-gathering operation, says Jake Williams, a former member of the National Security Agency's elite Tailored Access Operations hacking group.

He points out also that the ability to avoid detection and the single known victim suggest extreme care in targeting, stealth, and operation security.

But the compile times of various elements of TajMahalthe time stamps that indicate when a piece of it was programmedindicate it was active both before and long after that date.

Original article
Author: Wired

Wired has recently written 8 articles on similar topics including :
  1. "The leak may include data on hundreds of millions of Americans, with hundreds of details for each, from demographics to personal interests". (June 27, 2018)
  2. "Who needs the dark web? Researchers found 74 groups offering stolen credit cards and hacking tools by conducting simple Facebook searches". (April 5, 2019)
  3. "An exposed database belonging to Verifications.io contained both personal and business information, including 763 million unique email addresses". (March 7, 2019)
  4. "For the past four years, Facebook has quietly used a homegrown tool called Zoncolan to find bugs in its massive codebase". (August 17, 2019)
  5. "On Wednesday, Mark Zuckerberg laid out a vision for a very different Facebook—with a lot of unknowns about how to get there". (March 7, 2019)
  6. "The social network kept hundreds of millions of user passwords unscrambled, and employees could search them". (March 21, 2019)
  7. "The one-day pop-up kiosk is meant to show that Facebook takes users’ privacy concerns seriously. It also was an opportunity to gather more data". (December 14, 2018)
  8. "Opinion: Kids today have an online presence starting at birth, which raises a host of legal and ethical concerns. We desperately need a new data protection framework". (July 7, 2019)
Posted on  , , , ,