TechCentralTechCentral
    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News

      Dimension Data to be renamed NTT Data

      27 October 2023

      DStv makes RWC final stream available for R19.95

      27 October 2023

      Karpowership gets green light for Richards Bay plant

      27 October 2023

      Why people wave on Zoom

      27 October 2023

      Microsoft gaining ground in cloud race with AWS, Google

      27 October 2023
    • World

      Intel beats expectations; manufacturing momentum builds

      27 October 2023

      Google CEO to testify on Monday in antitrust trial

      27 October 2023

      Huawei sees growth in cloud, digital power segments

      27 October 2023

      China rushes to swap Western tech for domestic options

      26 October 2023

      Alphabet, Meta deliver solid financial performances

      26 October 2023
    • In-depth

      Quantum computers in 2023: what they do and where they’re heading

      22 October 2023

      How did Stephen van Coller really do as EOH CEO?

      19 October 2023

      Risc-V emerges as new front in US-China tech war

      6 October 2023

      Get ready for a tidal wave of software M&A

      26 September 2023

      Watch | A tour of Vumatel’s Alexandra fibre roll-out

      19 September 2023
    • TCS

      TCS | Mesh.trade’s Connie Bloem on the future of finance

      26 October 2023

      TCS | Rahul Jain on Peach Payments’ big funding round

      23 October 2023

      TCS+ | How MiWay uses conversation analytics

      16 October 2023

      TCS+ | The story behind MTN SuperFlex

      13 October 2023

      TCS | The Information Regulator bares its teeth – an interview with Pansy Tlakula

      6 October 2023
    • Opinion

      Big banks, take note: PayShap should be free

      20 October 2023

      Eskom rolling out virtual wheeling – here’s how it works

      4 October 2023

      How blockchain can help defeat the scourge of counterfeit goods

      29 September 2023

      There’s more to the skills crisis than emigration

      29 September 2023

      The role of banks in Africa’s digital future

      22 August 2023
    • Company Hubs
      • 4IRI
      • Africa Data Centres
      • Altron Document Solutions
      • Altron Systems Integration
      • Arctic Wolf
      • AvertITD
      • CoCre8
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • E4
      • Entelect
      • ESET
      • Euphoria Telecom
      • iKhokha
      • Incredible Business
      • iONLINE
      • LSD Open
      • Maxtec
      • MiRO
      • NEC XON
      • Next DLP
      • Ricoh
      • Skybox Security
      • SkyWire
      • Velocity Group
      • Videri Digital
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud computing
      • Consumer electronics
      • Cryptocurrencies
      • E-commerce
      • Education and skills
      • Energy
      • Fintech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Metaverse and gaming
      • Motoring and transport
      • Open-source software
      • Public sector
      • Science
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Sections » Information security » What is Russia’s Snake malware, and why is it so dangerous?

    What is Russia’s Snake malware, and why is it so dangerous?

    It’s being called Russia’s most sophisticated cyber espionage tool. But what is it?
    By The Conversation12 May 2023
    Facebook Twitter LinkedIn WhatsApp Telegram Email

    Like most people, I check my e-mails in the morning, wading through a combination of work requests, spam and news alerts peppering my inbox.

    But yesterday brought something different and deeply disturbing. I noticed an alert from the American Cybersecurity and Infrastructure Security Agency (CISA) about some very devious malware that had infected a network of computers.

    The malware in question is Snake, a cyber espionage tool deployed by Russia’s Federal Security Service that has been around for about 20 years.

    According to CISA, the Snake implant is the “most sophisticated cyber espionage tool designed and used by Centre 16 of Russia’s Federal Security Service for long-term intelligence collection on sensitive targets”.

    The stealthy Snake

    The Russian Federal Security Service developed the Snake network in 2003 to conduct global cyber espionage operations against Nato, companies, research institutions, media organisations, financial services, government agencies and more.

    So far, it has been detected on Windows, Linux and macOS computers in more than 50 countries.

    Elite Russian cyber espionage teams put the malware on a target’s computer, copy sensitive information of interest and then send it to Russia. It’s a simple concept, cloaked in masterful technical design.

    Since its creation, Russian cyber spies have regularly upgraded the Snake malware to avoid detection. The current version is cunning in how it persistently evades detection and protects itself.

    Moreover, the Snake network can disrupt critical industrial control systems that manage our buildings, hospitals, energy systems, water and wastewater systems, among others – so the risks went beyond just intelligence collection.

    Snake hunting

    On 9 May, the US department of justice announced the Federal Bureau of Investigation had finally disrupted the global Snake peer-to-peer network of infected computers.

    The covert network allowed infected computers to collect sensitive information. The Snake malware then disguised the sensitive information through sophisticated encryption, and sent it to the spy masters.

    Since the Snake malware used custom communication protocols, its covert operations remained undetected for decades. You can think of custom protocols as a way to transmit information so it can go undetected.

    However, with Russia’s war in Ukraine and the rise in cybersecurity activity over the past few years, the FBI has increased its monitoring of Russian cyber threats.

    While the Snake malware is an elegantly designed piece of code, it is complex and needs to be precisely deployed to avoid detection. According to the department of justice’s press release, Russian cyber spies were careless in more than a few instances and did not deploy it as designed.

    As a result, the Americans discovered Snake, and crafted a response.

    Snake bites

    The FBI received a court order to dismantle Snake as part of an operation code-named Medusa.

    They developed a tool called Perseus that causes the Snake malware to disable itself and stop further infection of other computers. The Perseus tool and instructions are freely available to guide detection, patching and remediation.

    The department of justice advises that Perseus only stops this malware on computers that are already infected; it does not patch vulnerabilities on other computers, or search for and remove other malware.

    Even though the Snake network has been disrupted, the department warned vulnerabilities may still exist for users, and they should follow safe cybersecurity hygiene practices.

    Snakebite treatment

    Fortunately, effective cybersecurity hygiene isn’t overly complicated. Microsoft has identified five activities that protect against 98% of cybersecurity attacks, whether you’re at home or work.

    • Enable multi-factor authentication across all your online accounts and apps. This login process requires multiple steps such as entering your password, followed by a code received through an SMS message – or even a biometric fingerprint or secret question (favourite drummer? Ringo!).
    • Apply “zero trust” principles. It’s best practice to authenticate, authorise and continuously validate all system users (internal and external) to ensure they have the right to use the systems. The zero-trust approach should be applied whether you’re using computer systems at work or home.
    • Use modern anti-malware programs. Anti-malware, also known as antivirus software, protects and removes malware from our systems, big and small.
    • Keep up to date. Regular system and software updates not only help keep new applications secure, but also patch vulnerable areas of your system.
    • Protect your data. Make a copy of your important data, whether it’s a physical printout or on an external device disconnected from your network, such as an external drive or USB.

    We can expect malicious cyberattacks to increase in the future, and their impact will only become more severe. The Snake malware is a sophisticated piece of software that raises yet another concern. But in this case, we have the antidote and can protect ourselves by proactively following the above steps.

    If you have concerns about the Snake malware you can read more here, or speak to your IT service desk.The Conversation

    • Written by Greg Skulmoski, associate professor, project management, Bond University
    • This article is republished from The Conversation under a Creative Commons licence

    Get TechCentral’s daily newsletter

    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email
    Previous ArticleSeacom hit by ‘cybersecurity incident’
    Next Article TCS+ | Data is key to any CX strategy: key insights from CallMiner

    Related Posts

    Dimension Data to be renamed NTT Data

    27 October 2023

    DStv makes RWC final stream available for R19.95

    27 October 2023

    Karpowership gets green light for Richards Bay plant

    27 October 2023
    Promoted

    Acsa aims for carbon neutrality by 2050

    27 October 2023

    iKhokha, Shopstar pave the way for simpler e-commerce

    27 October 2023

    Flutter vs React Native: a comprehensive comparison

    27 October 2023
    Opinion

    Big banks, take note: PayShap should be free

    20 October 2023

    Eskom rolling out virtual wheeling – here’s how it works

    4 October 2023

    How blockchain can help defeat the scourge of counterfeit goods

    29 September 2023

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    © 2009 - 2023 NewsCentral Media

    Type above and press Enter to search. Press Esc to cancel.