Contact Information

Theodore Lowe, Ap #867-859
Sit Rd, Azusa New York

We Are Available 24/ 7. Call Now.

A sophisticated form of malware known as Project Sauron went undetected for five years at a string of organisations, according to security researchers. The malware may have been designed by a state-sponsored group. It can disguise itself as benign files and does not operate in predictable ways, making it harder to detect. Experts from Kaspersky Lab and Symantec said it allows the attacker to spy on infected computers. In September last year, Kaspersky first detected the malware on an unspecified “government organisation” network. Since then, the firm claims to have found evidence of Project Sauron at more than 30 organizations in Russia, Iran and Rwanda.

Project Sauron is one of the most complicated IT based espionage ever made
Project Sauron is one of the most complicated IT based espionage ever made

Rwandan Minister of ICT and Youth Jean Philbert Nsengimana told Umuseke that they are assessing the veracity of this report and a specialized cyber security team of experts has been set up for this end.

Minister  Jean Philbert urged that  Rwanda will release a report clarifying how this is issue is handled and provide more details on the impacts it had on Rwanda.

He stated that the Kaspersky report can’t be relied on as a single source of veracity and Rwanda has started full investigation as to find out how reliable this information can be and what impacts it had on its cyber security particularly or otherwise.

Min Ngengimana told Umuseke that Rwandan experts didn’t find any  IT based alarming threats within five years stated in the report.

The Project Sauron generally targeted  government, scientific, military, telecoms and financial organizations, according to Kaspersky.

Separately, Symantec said it had found the malware in other countries, including at an airline in China and an embassy in Belgium.

Hidden threat

Project Sauron is able to disguise itself in a wide variety of ways – as files with names similar to those published by organisations like Microsoft, for example, and does not always use the same methods for sending data back to the attacker.

“The attackers clearly understand that we as researchers are always looking for patterns,” the company notes in its report. “Remove the patterns and the operation will be harder to discover.”

The malware can steal files, log all keystrokes and open a “back door” allowing wide-ranging access to the compromised computer, according to Symantec.

Project Sauron did not share any code with other known examples of similarly powerful malware, said Kaspersky’s director of threat research Costin Raiu.

“It really stands out by itself as something very, very sophisticated,” he told the BBC.

Mr Raiu also pointed out that two of the malware’s victims had been infected with other highly sophisticated malicious programs. One victim was found to have Regin spyware on their systems, for example.

“This would suggest that the actor behind Project Sauron is perhaps different,” suggested Mr Raiu.

USB attack

One aspect of Project Sauron that demonstrates the malware’s sophistication is its ability to steal sensitive data – such as encryption keys – from computers that are not actually connected to the internet.

This is known as “jumping the air-gap”.

For this, Project Sauron relies on an infected USB drive being inserted into the target computer.

A hidden cache of files on the drive is then able to deposit malware on to that PC.

It is not yet clear how the attackers would have used this method to control an air-gapped computer, but they believe it might have been via a “zero day” – previously undetected – exploit that they have not yet found.

“We believe it was probably deployed in rare, hard-to-catch instances,” notes the Kaspersky report.

Project Sauron is characteristic of state-sponsored style malware, according to cybersecurity expert Graham Cluley.

“These are very stealthy, insidious attacks that can lurk in the background for years gathering information,” he told the BBC.

“We have seen the steady progression and evolution of these sorts of attacks. As governments try to protect themselves and get clued up, it is essentially an arms race.”

UM– USEKE.RW

Share: