Today's AI/ML headlines are brought to you by ThreatPerspective

Biz & IT Ars Technica

Two never-before-seen tools, from same group, infect air-gapped devices

It's hard enough creating one air-gap-jumping tool. GoldenJackal did it 2x in 5 years.
Researchers have unearthed two sophisticated toolsets that a nation-state hacking group possibly from Russia used to steal sensitive data stored on air-gapped devices, meaning those that are deliberately isolated from the Internet or other networks to safeguard them from malware.

One of the custom tool collections was used starting in 2019 against a South Asian embassy in Belarus. A largely different toolset created by the same threat group infected a European Union government organization three years later. Researchers from ESET, the security firm that discovered the toolkits, said some of the components in both were identical to those fellow security firm Kaspersky described in research published last year and attributed to an unknown group, tracked as GoldenJackal, working for a nation-state. Based on the overlap, ESET has concluded that the same group is behind all the attacks observed by both firms.

Quite unusual


The practice of air gapping is typically reserved for the most sensitive networks or devices connected to them, such as those used in systems for voting, industrial control, manufacturing, and power generation. A host of malware used in espionage hacking over the past 15 years (for instance, here and here) demonstrate that air gapping isn’t a foolproof protection. It nonetheless forces threat groups to expend significant resources that are likely obtainable only by nation-states with superior technical acumen and unlimited budgets. ESET’s discovery puts GoldenJackal in a highly exclusive collection of threat groups.

Read full article

Comments


Published: 2024-10-09T12:26:26











© Digital Event Horizon . All rights reserved.

Privacy | Terms of Use | Contact Us