Mysterious Hackers Hid Their Swiss Army Spyware for 5 Years

Even rarer is the emergence of one whose spyware has 80 distinct components, capable of strange and unique cyberespionage tricksand who's kept those tricks under wraps for more than five years.

In a talk at the Kaspersky Security Analyst Summit in Singapore Wednesday, Kaspersky security researcher Alexey Shulmin revealed the security firm's discovery of a new spyware frameworkan adaptable, modular piece of software with a range of plugins for distinct espionage tasksthat it's calling TajMahal. The TajMahal framework's 80 modules, Shulmin says, comprise not only the typical keylogging and screengrabbing features of spyware, but also never-before-seen and obscure tricks.It can intercept documents in a printer queue, and keep track of "files of interest," automatically stealing them if a USB drive is inserted into the infected machine.

"Such a large set of modules tells us that this APT is extremely complex," Shulmin wrote in an email interview ahead of his talk, using the industry jargonshort for advanced persistent threatto refer to a sophisticated hackers who maintain long-term and stealthy access to victim networks.

Kaspersky says it first detected the TajMahal spyware framework last fall, on only a single victim's network: The embassy of a Central Asian country whose nationality and location Kaspersky declines to name. "This suggests that there are either further victims not yet identified, or additional versions of this malware in the wild, or possibly both."

Those initial findings may indicate a very cautious and discreet state-sponsored intelligence-gathering operation, says Jake Williams, a former member of the National Security Agency's elite Tailored Access Operations hacking group.

He points out also that the ability to avoid detection and the single known victim suggest extreme care in targeting, stealth, and operation security.

But the compile times of various elements of TajMahalthe time stamps that indicate when a piece of it was programmedindicate it was active both before and long after that date.

Original article
Author: Wired

Wired has recently written 9 articles on similar topics including :
  1. "Opinion: Utah legislators recently voted to pass landmark legislation in support of a new privacy law. Statehouses across the country should take notes". (March 22, 2019)
  2. "The idea that FaceApp is somehow exceptionally dangerous threatens to obscure the real point: All apps deserve this level of scrutiny". (July 17, 2019)
  3. "Some of those sequences are worth millions of dollars, but fortunately the hack isn’t easy to deploy—yet". (March 4, 2019)
  4. "Who needs the dark web? Researchers found 74 groups offering stolen credit cards and hacking tools by conducting simple Facebook searches". (April 5, 2019)
  5. "In the latest in its long string of incidents this year, Facebook let developers access the private photos of 6.8 million users". (December 15, 2018)
  6. "The social network kept hundreds of millions of user passwords unscrambled, and employees could search them". (March 21, 2019)
  7. "For the past four years, Facebook has quietly used a homegrown tool called Zoncolan to find bugs in its massive codebase". (August 17, 2019)
  8. "Opinion: Kids today have an online presence starting at birth, which raises a host of legal and ethical concerns. We desperately need a new data protection framework". (July 7, 2019)
  9. "The one-day pop-up kiosk is meant to show that Facebook takes users’ privacy concerns seriously. It also was an opportunity to gather more data". (December 14, 2018)
Posted on  , , , ,