Nick
In Remembrance
Most of the early Internet malware were simple programs created by bored amateurs. But it's not 1999 anymore. As the Internet has grown more sophisticated, so has malware. A new report from Kaspersky labs dissects what could be the most sophisticated malware yet discovered in the wild.
The software, dubbed Careto, is a sophisticated suite of tools for compromising computers and collecting a wealth of information from them. Whoever is behind the malware sends out "spear phishing" e-mails, with addresses designed to be mistaken for the Web sites of mainstream newspapers, such as The Washington Post or the Guardian. If the user clicks on a link, it takes her to a Web site that scans her system for vulnerabilities and attempts to infect it. There are multiple versions of the malicious software designed to attack Windows, Mac OS X and Linux versions, and Kapersky believes there may be versions that attack iOS and Android.
Once Careto has compromised a system, it begins collecting sensitive information from it. The software can "intercept network traffic, keystrokes, Skype conversations, analyse WiFi traffic, PGP keys, fetch all information from Nokia devices, screen captures and monitor all file operations."
It can also capture any encryption keys found on the machine, which can help launch attacks against other machines. The software has a plug-in architecture, allowing the attacker to dynamically load new software to perform tasks such as monitoring keystrokes or capturing the victim's email.
Read More : http://www.washingtonpost.com/blogs...ophisticated-and-we-dont-know-who-created-it/
The software, dubbed Careto, is a sophisticated suite of tools for compromising computers and collecting a wealth of information from them. Whoever is behind the malware sends out "spear phishing" e-mails, with addresses designed to be mistaken for the Web sites of mainstream newspapers, such as The Washington Post or the Guardian. If the user clicks on a link, it takes her to a Web site that scans her system for vulnerabilities and attempts to infect it. There are multiple versions of the malicious software designed to attack Windows, Mac OS X and Linux versions, and Kapersky believes there may be versions that attack iOS and Android.
Once Careto has compromised a system, it begins collecting sensitive information from it. The software can "intercept network traffic, keystrokes, Skype conversations, analyse WiFi traffic, PGP keys, fetch all information from Nokia devices, screen captures and monitor all file operations."
It can also capture any encryption keys found on the machine, which can help launch attacks against other machines. The software has a plug-in architecture, allowing the attacker to dynamically load new software to perform tasks such as monitoring keystrokes or capturing the victim's email.
Read More : http://www.washingtonpost.com/blogs...ophisticated-and-we-dont-know-who-created-it/