• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • January 22nd, 2021
  • Home
  • Advertise
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
Home
Surveillance
NSA

Researchers Found Windows’ Malware Similar To The One Used by NSA

December 9th, 2015 Pushpa Mishra Malware, NSA, Security 0 comments
Researchers Found Windows’ Malware Similar To The One Used by NSA
Share on FacebookShare on Twitter

NSA’s one of the known snooping tactics is installing a malware into hard drive’s firmware which makes the deletion of the malware nearly impossible even the malware can avoid formatting of the hard drive.

Nemesis is a malware that can be used for similar purposes as it can avoid clean-up software and can even avoid reinstalling of windows altogether by hiding behind boot records, according to FireEye.

What’s the malware about?

Nemesis is a dangerous malware that is designed for carrying out multiple functions like transferring files, injecting processes, capturing screenshots and keystrokes. It can even steal the financial data from a system. It can even bypass banking systems and can transfer all the financial data to the developers.

What makes it lethal is the fact that it is very difficult to detect by any detection programs. Basically, the malware’s feature of hiding behind the boot records allows it to remain anonymous for any security program even the virus check on the start-up is avoided through this feature.

[fullsquaread][/fullsquaread]

How to avoid it?

So, what should users do if they are are infected with this malware? Well, according to the FireEye research team if this ever happens to a user they will be required to replace his hard drive altogether, otherwise there is no chance with normal detection systems, the malware will always remain there no matter what you do.

But, this may not be feasible big businesses or enterprises that run a single hard drive on many computers and a replacement could be real daunting as it would take the time to backup all the data on the systems and then start fresh.

Modern operating system secured

Though, modern operating systems like windows 8 and 10 might not be affected by this malware as they utilize secure boot which prevents a replacement of the window bootkit.

Bootkit usually targets enterprise and financial systems which are usually not that updated and have an older operating system in place. So, there is a need for updated financial and enterprise systems, otherwise they could face the worse.

In August this year, a security researcher created a proof-of-concept attack for Macs that covertly replaced the firmware that boots up most modern OS X machines. (Apple has fixed the flaw)

[src src=”Source” url=”https://www.fireeye.com/blog/threat-research/2015/12/fin1-targets-boot-record.html”]FireEye[/src] 

  • Tags
  • Data
  • Infosec
  • Malware
  • NSA
  • Privacy
  • security
  • Windows
Facebook Twitter LinkedIn Pinterest
Previous article Scammers Hack Cricket South Africa Facebook Page with Adult Content
Next article Chrome App for Android To Alert Users on Visiting Malicious Sites
Pushpa Mishra

Pushpa Mishra

Pushpa is a Dubai based scientific academic editor who worked for Reuters' Zawya business magazine and at the same time a passionate writer for HackRead. From the very first day she has been a blessing for team Hackread. Thanks to her dedication and enthusiasm.

Related Posts
Gamarue malware found in UK Govt-funded laptops for homeschoolers

Gamarue malware found in UK Govt-funded laptops for homeschoolers

Shazam Vulnerability exposed location of Android, iOS users

Shazam Vulnerability exposed location of Android, iOS users

Ongoing 'FreakOut' malware attack turns Linux devices into IRC botnet

Ongoing 'FreakOut' malware attack turns Linux devices into IRC botnet

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

Latest Posts
Gamarue malware found in UK Govt-funded laptops for homeschoolers
Security

Gamarue malware found in UK Govt-funded laptops for homeschoolers

16
Shazam Vulnerability exposed location of Android, iOS users
Security

Shazam Vulnerability exposed location of Android, iOS users

155
Ongoing 'FreakOut' malware attack turns Linux devices into IRC botnet
Security

Ongoing 'FreakOut' malware attack turns Linux devices into IRC botnet

96

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us