Russian gov spots cyberespionage malware on 20 networks systems

Public authorities, scientific entities, military, and other infrastructures were targeted by cyberespionage malware.
Public authorities, scientific entities, military, and other infrastructures were targeted by cyberespionage malware.

On the heels of Russian accusations of hacking the Clinton Campaign, the Democratic National Committee (DNC) and the Democratic Congressional Campaign Committee (DCCC), the Russian Federal Security Service (FSB) announced it found malware on PCs at 20 government organization networks.

Public authorities, scientific entities, military, and other infrastructures were targeted by cyberespionage malware, according to a July 30 Russian government press release translated using Google.

The malware adapted to the characteristics of each computer targeted, was delivered via malicious email attachment, and is capable of intercepting network traffic, logging keystrokes, capturing screenshots, listening to phone calls, and spying on targets using webcams and microphones, officials said in the release.

The FSB didn't point blame in the release, but did mention that the malware used filenames, parameters and infection methods similar to those used in high-profile operation cyberespionage campaigns around the world. 

You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS