<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>VR World &#187; Kaspersky Lab</title>
	<atom:link href="http://www.vrworld.com/tag/kaspersky-lab/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.vrworld.com</link>
	<description></description>
	<lastBuildDate>Fri, 10 Apr 2015 07:54:22 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.1.1</generator>
	<item>
		<title>Kaspersky Lab Researchers Discover Malware That Lurks in HDD Firmware</title>
		<link>http://www.vrworld.com/2015/02/17/kaspersky-lab-researchers-discover-malware-lurks-hdd-firmware/</link>
		<comments>http://www.vrworld.com/2015/02/17/kaspersky-lab-researchers-discover-malware-lurks-hdd-firmware/#comments</comments>
		<pubDate>Tue, 17 Feb 2015 07:27:37 +0000</pubDate>
		<dc:creator><![CDATA[Sam Reynolds]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[equation group]]></category>
		<category><![CDATA[Kaspersky Lab]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[virus]]></category>

		<guid isPermaLink="false">http://www.vrworld.com/?p=47421</guid>
		<description><![CDATA[<p>Malware is traced back to the likely NSA-affiliated ‘Equation Group’.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2015/02/17/kaspersky-lab-researchers-discover-malware-lurks-hdd-firmware/">Kaspersky Lab Researchers Discover Malware That Lurks in HDD Firmware</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="1302" height="625" src="http://cdn.vrworld.com/wp-content/uploads/2015/02/hd-classes.jpg" class="attachment-post-thumbnail wp-post-image" alt="hd-classes" /></p><p>Nearly a decade before Stuxnet and Flame were household words, malware that has some genetic similarities was infecting computers in targeted regions across the globe stealthily burrowing itself into hard disks and flash drives.</p>
<p>That was the topic of a <a href="https://securelist.com/files/2015/02/Equation_group_questions_and_answers.pdf">report</a> presented by Kaspersky Lab researchers at the group’s annual summit in Cancun, Mexico. Kaspersky Lab said that the malware is some of the most advanced it has ever seen, and has traced back its origins to as early as 2001. Resarchers from Kaspersky Lab have given the organization behind the malware platform the same “the Equation Group” (likely because of its preference for mathematically complex attacks) and the actual software names like EquationLaser, EquationDrug, DoubleFantasy, TripleFantasy, Fanny and GrayFish.</p>
<p>&#8220;The Equation group is probably one of the most sophisticated cyber attack groups in the world; and they are the most advanced threat actor we have seen,&#8221; Kaspersky Lab said in its report.</p>
<p>Out of the toolset discovered by Kaspersky Lab researchers, two items stand out for their complexity: Fanny and GrayFish.</p>
<p>According to researchers the purpose of Fanny is to map out air gapped networks, and allow for malicious commands sent from a master server to run on these networks.</p>
<p><a href="http://cdn.vrworld.com/wp-content/uploads/2015/02/Fanny-640x7841.png" rel="lightbox-0"><img class="aligncenter size-medium wp-image-47423" src="http://cdn.vrworld.com/wp-content/uploads/2015/02/Fanny-640x7841-490x600.png" alt="Fanny-640x7841" width="490" height="600" /></a></p>
<p>The bridge between the air gapped network and the internet is a USB stick with crippled firmware and a hidden storage volume. The name Fanny comes from a file, Fanny.bmp that has been found in all infected USB drives. The report says that the majority of these USB drives were found in the Middle East. Around the world the infected USB drives were found in 30 different countries.</p>
<p><a href="http://cdn.vrworld.com/wp-content/uploads/2015/02/Equation_1.jpg" rel="lightbox-1"><img class="aligncenter size-medium wp-image-47422" src="http://cdn.vrworld.com/wp-content/uploads/2015/02/Equation_1-600x199.jpg" alt="Equation_1" width="600" height="199" /></a></p>
<p>The other highlight of the malware discovered is GrayFish. GrayFish is able to burrow itself in the firmware of HDDs and SSDs. Deep rewrites and formatting of the drive do nothing to remove the malware and it’s stuck in the firmware of the drive itself. The only way to destroy GrayFish is to destroy the drive itself. Kaspersky said that the malware has been discovered in the firmware of 12 major manufactures of HDDs and SSDs.</p>
<p>Kaspersky Labs doesn’t directly suggest that the malware suite is the product of efforts by the NSA, but say that it’s definitely the outcome of efforts by a highly advanced electronic intelligence organization.</p>
<p>In 2012 <a href="http://www.wired.com/2012/07/ff_kaspersky/all/"><i>Wired</i></a> magazine published an interesting feature, outlining the relationship between the founder of Kaspersky Labs and Russian intelligence services. It’s worth a read considering the group’s report.</p>
<p><strong></p>
<p></strong></p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2015/02/17/kaspersky-lab-researchers-discover-malware-lurks-hdd-firmware/">Kaspersky Lab Researchers Discover Malware That Lurks in HDD Firmware</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2015/02/17/kaspersky-lab-researchers-discover-malware-lurks-hdd-firmware/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

Content Delivery Network via Amazon Web Services: CloudFront: cdn.vrworld.com

 Served from: www.vrworld.com @ 2015-04-10 22:18:15 by W3 Total Cache -->