Gauss: Nation-state cyber-surveillance meets banking Trojan - Securelist

GAUSS’ Lightning round! Quick facts on the first financial cyber-weapon malware:

● Gauss started operations during the September 2011 timeframe.
● Gauss was first discovered in June 2012, during in-depth analysis of the Flame malware.
● This discovery was made possible due to strong code resemblances to Flame’s.

● The Gauss C&C infrastructure was shutdown in July 2012 shortly after its discovery. Currently the malware is in a dormant state, waiting for its C&C servers to become active.
● Since late May 2012, more than 2,500 infections were recorded by Kaspersky Lab’s cloud-based security system, with the estimated total number of victims of Gauss probably being in tens of thousands. This number is lower compared to the case of Stuxnet but it’s significantly higher than the number of attacks in Flame and Duqu.
● Gauss steals detailed information about the infected PCs including browser history, cookies, passwords, social network profiles info and even system configurations. It is also capable of stealing access credentials for various online banking systems and payment methods. I
● Gauss was designed to steal data from several Lebanese banks including Bank of Beirut, EBLF, BlomBank, ByblosBank, FransaBank and Credit Libanais. In addition, it targets users of Citibank and PayPal.



Gauss: Nation-state cyber-surveillance meets banking Trojan - Securelist: Gauss is the most recent cyber-surveillance operation in the Stuxnet, Duqu and Flame saga. It was probably created in mid-2011 and deployed for the first time in August-September 2011. Gauss was discovered during the course of the ongoing effort initiated by the International Telecommunications Union (ITU), following the discovery of Flame, which is part of a sustained effort to mitigate the risk posed by cyber-weapons.

Megjegyzések

Népszerű bejegyzések ezen a blogon

"Voices from DARPA" Podcast, Episode 41: The AI Tutor

Egypt: Will U.S. And NATO Launch Second Suez Intervention?