- BlackBit and LokiLocker Ransomware Attacks are on the Rise in Russia - August 17, 2023
- How Can Phishing be Used to Make Governmental Services a “Profitable Business”? - August 16, 2023
- The Most Dangerous Hacker Tools and How to Detect Them - August 16, 2023
By getting a court order that permitted them to basically hack into machines that were already infected with malicious malware, the US Department of Justice said today that it had stopped the infamous Snake virus.
The US asserts that the Turla cyber unit created the Snake malware in 2003 to conduct global cyberespionage activities. Investigators claim that over time, the malware, which has been modified often by the secret services, has infiltrated American businesses, academic institutions, and governments, including NATO.
What is Special About This Virus
The Snake virus is typically hard to find and may survive removal attempts on the computer. According to US cyber officials, “We observed compatible implants of the Snake virus for Windows, macOS, and Linux operating systems.”
According to the study, the cities of Ryazan and Moscow are home to the virus’ command headquarters. Federal investigators have found the Snake virus simultaneously in more than 50 nations, including the United States.
The US discovered that the Snake virus operates on a peer-to-peer network with its own unique communication protocols to preserve anonymity in order to eradicate the threat. By examining the peer-to-peer network, the FBI was able to decipher and decrypt the conversations, which enabled them to eliminate the virus.
According to the Justice Department, the FBI developed the Perseus tool to combat Snake as a result of being inspired by Greek mythology, in which this hero vanquished the Medusa Gorgon. The malware running on the afflicted machine is deactivated by Perseus’ orders.
Cybersecurity Measures
The US is cautioning victims that they still need to secure their system against potential snooping even eradicating the malware. “The Snake virus shutdown operation did not fix vulnerabilities or look for or remove any additional malware or hacking tools that hacker groups may have placed on victims’ networks,” the Justice Department stated in a statement.