Prague would be 'almost impossible' to remove.
HBGary discussed project contracted with the government.
HBGary discussed project contracted with the government.
A collection of emails leaked after security firm HBGary Anonymous invasion reveals a development project of a rootkit-type virus - which is camouflaged in the system to take control of your computer to an attacker. The design of the virus, codenamed Magenta, was sent an official to co-founder of HBGary, Greg Hoglund, who referred him to the Farallon Research, a company whose goal is to "connect advanced commercial technologies and companies that build them with the needs of government United States. "
We are not leaked emails any other information about the future of the proposal or if it was accepted. The e-mail to the Farallon is dated January 7, 2011.
We are not leaked emails any other information about the future of the proposal or if it was accepted. The e-mail to the Farallon is dated January 7, 2011.
The proposal, found among data leaks by Crowdleaks collaborative journalism site, explains how the malicious code would be able to remain in the system so that it would be very difficult to detect or remove it. He would use "4kb or less memory and can accept external commands - to control the infected machine - in various forms, including bypassing firewalls.
Hoglund is responsible for Rootkit.com site, known to be a virtual library of resources - both offense and defense - related to viruses and worms that are camouflaged in the system and allow the attacker to keep everything under control invisibly, stealing data and performing other malicious activity.
Stuxnet
The HBGary Stuxnet received a copy of the maker of McAfee antivirus. The analysis of documents by Crowdleaks points to a possible interest in making the company not to comment publicly the virus, which attacked nuclear centrifuges in Iran and may have been created by agents of the United States and Israel.
The company dealt with the relationship of the virus with the security systems of the United States - pointing out the vulnerability of organs such as the Transportation Security Administration (TSA).
The company also had connections in the National Security Agency U.S. (NSA). In an email, Aaron Barr, responsible for company related HBGary Federal, provide your phone number to Cheryl D. Peace, who works at the NSA in an unknown position, but that was the director of cybersecurity at the Department of National Security in 2004.
The company dealt with the relationship of the virus with the security systems of the United States - pointing out the vulnerability of organs such as the Transportation Security Administration (TSA).
The company also had connections in the National Security Agency U.S. (NSA). In an email, Aaron Barr, responsible for company related HBGary Federal, provide your phone number to Cheryl D. Peace, who works at the NSA in an unknown position, but that was the director of cybersecurity at the Department of National Security in 2004.
No comments:
Post a Comment