Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 13 submissions in the queue.
posted by janrinok on Monday March 16 2015, @02:08PM   Printer-friendly
from the likely-but-not-proven dept.

All of you knew that it could only get worse:

Kaspersky malware probers have uncovered a new 'operating system-like' platform that [they claim] was developed and used by the National Security Agency (NSA) in its Equation spying arsenal. The EquationDrug or Equestre platform is used to deploy [an estimated] 116 plug-in modules to target computers that can siphon data and spy on victims. So far, only 30 modules have been identified.

"It's important to note that EquationDrug is not just a trojan, but a full espionage platform, which includes a framework for conducting cyber-espionage activities by deploying specific modules on the machines of selected victims," Kaspersky researchers say in a report.

The article goes on to explain that Kaspersky further believes that the software is part of the "NSA's campaign to infect hard disk firmware". There is considerably more detail in the article.

I think I am going to get my old manual typewriter out of the garage, get a new ribbon, use U.S. Mail instead of e-mail, and buy more ink for my fountain pens.

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by wantkitteh on Tuesday March 17 2015, @05:22AM

    by wantkitteh (3362) on Tuesday March 17 2015, @05:22AM (#158745) Homepage Journal

    If you consider how a piece of malware like this would actual infect a system, it's pretty obvious that the OS is booted and the encryption key has been entered prior to the HDD firmware being subverted. The malware that annexes this storage area will have to deal with adaptations to the file system to maintain system integrity. Given the level of sophistication in play here, I don't think it's too much to expect full-drive encryption techniques to be subjected to the same kind of integrity preservation techniques - there's a good chance this all would have been discovered earlier if infected systems with encrypted drives started falling over and dying for no reason.

    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2