Tuesday, August 18, 2015

APT:Hacking Team RCS

Hacking Team RCS

STATUS:Active
TYPE:Backdoor, Trojan, Rootkit
DISCOVERY:2011
TARGETED PLATFORMS:Windows, OS X, BlackBerry, Windows Mobile, Android, iOS
FIRST KNOWN SAMPLE:2008
NUMBER OF TARGETS:101-500

TOP TARGETED COUNTRIES:
Russia, China, Italy, Vietnam, USA, Turkey, Iraq, Mexico, Germany, India

Special Features:
“Business-to-government” spyware
Can monitor any action performed using a personal computer/mobile device.
Modules for computers and mobile devices
Self-replication via USB flash drive
Infection of virtual VMware machines by copying itself into the autorun folder on the virtual drive
Ability to self-update
Samples are signed by legal authorities
local infections via USB cables while synchronizing mobile devices
Specific malicious implant for every concrete target
At least 39 Apple devices supported by the iOS mobile modules
Both jailbroken and non-jailbroken iPhones can be infected: an attacker can conduct a remote jailbreak through already infected computers

TARGETS:
Activists
Journalists
Politicians
Criminal suspects

No comments:

Operating system - Part 1:

 In our blog, we published several articles on OS concepts which mostly on the perspective for malware analysis/security research. In few in...