یاد من باشد فردا حتما باور این را بکنم، که دگر فرصت نیست و بدانم که اگر دیر کنم ،مهلتی نیست مرا و بدانم که شبی خواهم رفت و شبی هست، که نیست، پس از آن فردایی

درباره من

یاد من باشد فردا دم صبح جور دیگر باشم بد نگویم به هوا، آب ، زمین مهربان باشم، با مردم شهر و فراموش کنم، هر چه گذشت

فروردین 1396
1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31
امـکـا نــا ت جــا نـبـی
اضافه به علاقمندی ها
صفحه اصلی
ایمیل من
مطالب وبلاگ
لینکهای وبلاگ
صفحه خانگی شود
speed test
رازهــــای زنـــدگی

عادت کن که عادت نکنی

از محبت خارها گل میشود

تنبلی دزد آرزوهاست

Radio Payam
صلوات خاصه امام رضا (ع)
میزان رضایت کلی شما از وبلاگ
ابر برجسب
تعداد بازدیدکنندگان : 338520



Kaspersky Lab uncovers a suite of surveillance platforms that hide in hard drive firmware

nsa, toshiba, seagate, western digital, stuxnet, spying, surveillance, hard drives, edward snowden, equation group

Security researchers at Kaspersky Lab have unearthed a suite of surveillance platforms that can hide within the firmware of hard drives from more than a dozen manufacturers. The attackers, which Kaspersky is calling the Equation Group due to their complex skill set, are the most advanced that the researchers have encountered to date.

The programs, some of which date back to 2001, appear to have been developed in succession with each new program being more sophisticated than the last according to Wired.

Personal computers in more than 30 different countries have been discovered to carry the infection, Kaspersky said.

nsa toshiba seagate western digital stuxnet spying surveillance hard drives edward snowden equation group

One of the worms uncovered has direct connections with Stuxnet and may have even been used as a test to help figure out the best route for the malware to reach systems involved in Iran’s nuclear program. Researchers didn’t name who they believe might be behind the attacks although there’s a good bit of circumstantial evidence that points to the NSA.

One component of the suite, GrayFish, is able to reflash the firmware on hard drives. Because it resides in the firmware, reformatting the drive doesn’t get rid of the infection. Key to being able to rewrite the firmware is having access to source code. If the NSA is indeed behind the attacks, getting source code wouldn’t present too much of an issue.

In addition to physically intercepting shipments (in this case, hard drives) and loading them with malware before repackaging and sending to targets, the NSA could have simply asked manufacturers for their source code (directly or indirectly) or posed as software developers.

برچسب‌ها: Kaspersky ، firmware ، hard ، hard drive firmware ، maniei

نظرات (0)

برای نمایش آواتار خود در این وبلاگ در سایت ثبت نام کنید. (راهنما)

نام :
ایمیل :
وب/وبلاگ :
ایمیل شما بعد از ثبت نمایش داده نخواهد شد