They then tracked the spyware and found 12 C&C servers in the United States, Indonesia, Australia, Qatar, Ethiopia, Czech Republic, Estonia, Mongolia, Latvia and Dubai. The researches say they analyzed characteristics that let them identify communications between FinFisher and C&C servers. Researchers at Rapid7 identified the IP addresses of a handful of command and control (C&C) servers using FinFisher, which was developed by Gamma Group. Researchers say Gauss is almost certainly the work of the same team that created the Flame malware, which is thought to be is a U.S., state-sponsored group.Ĭrooks Thought to Have Stolen FinFisher Police Spyware: FinFisher, a spyware tool sold to law enforcement agencies, was detected in countries where it should never have been available, suggesting it may already have been commandeered by cyber criminals. Most notably: Gauss can steal online banking credentials, and it has an encrypted payload that experts haven’t been able to crack. ![]() The program, named Gauss, has some of the same code as Flame, but it is different in a number of ways. Gauss Malware Sparked by Flame, Infects Thousands of PCs in Middle East: A newly identified piece of malware is a direct descendant of Flame, experts say, and it has been found on thousands of PCs in the Middle East.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |