{"id":184837,"date":"2015-02-18T19:58:33","date_gmt":"2015-02-19T00:58:33","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/super-sneaky-malware-found-in-companies-worldwide.php"},"modified":"2015-02-18T19:58:33","modified_gmt":"2015-02-19T00:58:33","slug":"super-sneaky-malware-found-in-companies-worldwide","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/super-computer\/super-sneaky-malware-found-in-companies-worldwide.php","title":{"rendered":"Super-sneaky malware found in companies worldwide"},"content":{"rendered":"<p><p>    That's according to a report Monday by Internet security company    Kaspersky, which described a hacking campaign \"that exceeds    anything we have ever seen before.\" The mysterious group, which    researchers nicknamed \"the Equation group,\" uses malware that's    unusually quiet, complex and powerful.  <\/p>\n<p>    And in some cases, it planted spyware on computers' firmware,    the programming that lives permanently on hardware. It's an    unheard-of move that means the malware can avoid detection by    antivirus software. Reinstalling a computer's operating system    or reformatting the hard disk won't even fix the problem.  <\/p>\n<p>    If you've got this, you might as well throw your computer away.  <\/p>\n<p>    What's even more interesting is that Kaspersky's researchers    say that the Equation group uses a hacking tool called \"GROK.\"    That's a tool used exclusively by the NSA's elite cyber-warfare    unit, Tailored Access Operations, according to classified NSA documents released by former    contractor Edward Snowden last year.  <\/p>\n<p>    Kaspersky says the Equation group also appears to have ties to    Stuxnet, the computer worm that sabotaged Iran's nuclear    enrichment program in 2010 and was later revealed to be    a joint U.S.-Israeli project.  <\/p>\n<p>    The NSA declined to comment specifically on the Kaspersky    report. But the agency noted that its efforts are focused on    foiling terrorist plots from al-Qaeda and ISIS, stemming the    flow of weapons of mass destruction and blocking aggression    from foreign rivals.  <\/p>\n<p>    \"The U.S. government calls on our intelligence agencies to    protect the United States, its citizens, and its allies,\" NSA    said in a statement to CNN.  <\/p>\n<p>    The Kaspersky report is the latest to depict a world engaged in    constant cyber espionage. In the past, security firms have    noted how     Chinese hacker spies take business plans from power plants.        Russian hackers break into oil and gas companies.  <\/p>\n<p>    Kaspersky research director Costin Raiu said the Equation group    hacked into hospitals in China; banks and aerospace companies    in Iran; energy companies and government offices in Pakistan;    and universities, military facilities and rocket science    research institutions in Russia.  <\/p>\n<p>    The attacked Iran the most, researchers said.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the rest here: <\/p>\n<p><a target=\"_blank\" href=\"http:\/\/money.cnn.com\/2015\/02\/17\/technology\/security\/malware-nsa\/index.html\/RK=0\/RS=MkVzsuHtkBf42E5owRKQGdGy1O4-\" title=\"Super-sneaky malware found in companies worldwide\">Super-sneaky malware found in companies worldwide<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> That's according to a report Monday by Internet security company Kaspersky, which described a hacking campaign \"that exceeds anything we have ever seen before.\" The mysterious group, which researchers nicknamed \"the Equation group,\" uses malware that's unusually quiet, complex and powerful. And in some cases, it planted spyware on computers' firmware, the programming that lives permanently on hardware.  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/super-computer\/super-sneaky-malware-found-in-companies-worldwide.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[41],"tags":[],"class_list":["post-184837","post","type-post","status-publish","format-standard","hentry","category-super-computer"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/184837"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=184837"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/184837\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=184837"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=184837"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=184837"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}