A previously unknown hacking group variously dubbed “Strider” or “Project Sauron” has carried out cyber-espionage attacks against select targets including Rwanda, Iran, Russia, China, India, Sweden, Belgium, and Rwanda. The cyber raid has used a highly advanced malware dubbed Remsec.
The group, which has been active since at least 2011 and could have links to a national intelligence agency, uses Remsec, an advanced piece of hidden malware, Symantec. Security researchers added The malware majorly targeted the state and military organizations.
Symantec, an American technology company, has stated that the hacking group had started activities since 2011, and that it was linked to a state intelligence service. The company added that, however, had no information at its disposal yet about the country or group behind the cyberattack.
The significant point is that the malware used in the attack is mostly active in targeting organizational networks, and that it does not attack the personal computers. The spyware can fully seize control of the victim computers, record the keyword’s information, and steal user’s files and data.
Commenting on activities of the hacking group, Symantec maintained that Strider was capable of producing completely advanced and personal malwares. The American company continued that the group has been working undetected for five years.
The Kaspersky Internet Security, another American company, has released some details about the group and its activities, as well as some characteristics of the Remsec spyware. The company said that the hacking group which is called by Kaspersky Project Sauron has the features of an advanced hackers group.
Kaspersky said that only in Iran, Russia, and Rwanda over 30 significant state organizations had come under attack of the hacking group. Military, state, scientific and research centers, telecommunications companies, and financial institutions have been victims of the cyber raid.
Théogène U @Bwiza.com