Kasperky Identify The ‘Equation Group’

Kaspersky Lab has uncovered an advanced hacking group, allegedly within the US National Security Agency (NSA), that has been arming the US with offensive  cyberwarfare capabilities.

Similar to the original Manhattan Project, which gathered the best scientists around and saw the western superpower develop the world’s first ever atomic bomb at the close of WWII, the US is working behind the scenes to strengthen it’s defences by increasing its attacking capabilities.

Kaspersky last week reported on a whole suite of advanced Trojans linked back to the ‘Equation Group’ – which could be a wing of NSA –far more sophisticated than anyone could have expected.
Tracing its origins back as far as 2001 (and alluding that it could go as far back as 1996), Kaspersky found numerous pieces of malware, some powerful enough to reprogram the hard drive firmware of over a dozen different hard drive brands, including Seagate, Western Digital, Toshiba, Maxtor and IBM.

The Equation Group’s suite of tools can begin to infect machines in very clandestine ways. In the first stage the agency might compromise a web forum or an ad network and use it to serve a simple 'validator' backdoor to potential targets.
From here the Trojan establishes if the machine is of interest or not. Then a more sophisticated piece of malware comes into play, and it’s incredibly advanced. 

Ein News
 

 

« The Spy Cables: A Glimpse into Espionage
Cyber Insurance Market Boosting Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Free Access: Cyber Security Supplier Directory listing 5,000+ specialist service providers.

Arista Networks

Arista Networks

Arista Networks was founded to deliver software defined cloud networking solutions for large data centre and computing environments.

Bulletproof

Bulletproof

Bulletproof offer a range of security services, from penetration testing and vulnerability assessments to 24/7 security monitoring, and consultancy.

Preempt Security

Preempt Security

The Preempt Platform delivers adaptive threat prevention that continuously preempts threats based on identity, behavior and risk.

Swimlane

Swimlane

Swimlane is a leader in security automation and orchestration (SAO). Our platform empowers organizations to manage, respond and neutralize cyber threats with adaptability, efficiency and speed.

Bio-Morphis

Bio-Morphis

Bio-Morphis Reflex solution is a paradigm shift in the approach to information systems security.

Inspira Enterprise

Inspira Enterprise

Inspira Enterprise is a leading digital transformation company with expertise in Cyber Security, Internet of Things (IOT), Blockchain, Big Data & Analytics, Intelligent Automation and Cloud Computing.

TechForing Ltd.

TechForing Ltd.

TechForing Ltd. works for business organization's cyber security and cyber crime incident managements. We help business to secure their business online.

Basil Security

Basil Security

Basil is a policy enforcement tool for applications and infrastructure, as well as for security, development and operations (DevSecOps).

Bowhead Cybersecurity Solutions and Services (BCSS)

Bowhead Cybersecurity Solutions and Services (BCSS)

Bowhead Cybersecurity Solutions and Services provides high-end technical and professional services with an emphasis on providing Cyber Solutions.

Twingate

Twingate

Twingate help organizations secure and manage access to their technology resources in a world where people work from anywhere.

Support Link Technologies (SLT)

Support Link Technologies (SLT)

Support Link Technologies are an IT Solutions Company committed to achieving customer satisfaction through excellent customer service.