{"id":807,"date":"2016-08-10T13:56:49","date_gmt":"2016-08-10T05:56:49","guid":{"rendered":"https:\/\/tongwing.woon.sg\/blog\/?p=807"},"modified":"2016-08-10T13:57:26","modified_gmt":"2016-08-10T05:57:26","slug":"researchers-crack-open-unusually-advanced-malware-that-hid-for-5-years","status":"publish","type":"post","link":"https:\/\/tongwing.woon.sg\/blog\/researchers-crack-open-unusually-advanced-malware-that-hid-for-5-years\/","title":{"rendered":"Researchers crack open unusually advanced malware that hid for 5 years"},"content":{"rendered":"<p>Another impressive <a href=\"https:\/\/tongwing.woon.sg\/blog\/the-digital-hunt-for-duqu-a-dangerous-and-cunning-u-s-israeli-spy-virus-the-intercept\/\">likely-state-sponsored<\/a> malware. Data exfiltration from air-gapped machines is the holy grail of the malware world. If they succeeded this will be huge.<\/p>\n<blockquote><p>The malware\u2014known alternatively as &#8220;ProjectSauron&#8221; by researchers from Kaspersky Lab and &#8220;Remsec&#8221; by their counterparts from Symantec\u2014has been active since at least 2011 and has been discovered on 30 or so targets. Its ability to operate undetected for five years is a testament to its creators, who clearly studied other state-sponsored hacking groups in an attempt to replicate their advances and avoid their mistakes.<\/p><\/blockquote>\n<p>Source: <em><a href=\"http:\/\/arstechnica.com\/security\/2016\/08\/researchers-crack-open-unusually-advanced-malware-that-hid-for-5-years\/\">Researchers crack open unusually advanced malware that hid for 5 years<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Another impressive likely-state-sponsored malware. Data exfiltration from air-gapped machines is the holy grail of the malware world. If they succeeded this will be huge. The malware\u2014known alternatively as &#8220;ProjectSauron&#8221; by researchers from Kaspersky Lab and &#8220;Remsec&#8221; by their counterparts from Symantec\u2014has been active since at least 2011 and has been discovered on 30 or so [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"_links":{"self":[{"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/posts\/807"}],"collection":[{"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/comments?post=807"}],"version-history":[{"count":2,"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/posts\/807\/revisions"}],"predecessor-version":[{"id":809,"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/posts\/807\/revisions\/809"}],"wp:attachment":[{"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/media?parent=807"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/categories?post=807"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/tags?post=807"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}