This Friday Kespersky revealed the existence of this long running hacking campaign. The Kespersky Lab discovered this advanced malware infection that is named as the Slingshot Malware. According to Kespersky, this infection has planted spyware on over hundred targets in over eleven countries.
A majority of targets are from Yemen and Kenya. These hackers accessed the deepest level of victim’s computer’s operating system and taking in complete control of the targeted machine. However, Kespersky, haven’t yet described how the spyware infected the targets. In a few cases, the malicious code has been installed via the small-business-grade routers which have been compromised by the Slingshot Malware.
Routers are always an attractive target for the hackers. This time, unlike the previous router – hacking campaigns, the slingshot hacker installs exploited routers’ position as a little scrutinized foothold which can easily spread the infections to vulnerable computers within a network which allows a deeper access to spies. The Mikro Tik routers were the major target and the company has already resolved the vulnerability. However, Kespersky still believes that other routers can still be infected.
Kespersky reported that the SlingShot malware can collect every kind of information from the PC’s which are attacked through a compromised router. It can spy on the user and collect sensitive information which includes keyboard data, screenshot, passwords and other information.
There are still many unanswered questions about the SlingShot malware attack. It is still unknown whether the routers served to be the initial point of infection for a majority of the Slingshot router attack. The thing which makes SlingShot so dangerous is that it is carried on the legitimate router downloads and file executions.
If you dig deep down into the details of vulnerabilities, it is no doubt that this particular malware program is highly sophisticated. The researchers suspected that it is the work of highly organized and professional group which is likely to be state-sponsored. As per its capabilities, this malware infection can access the system and is capable of stealing any type of information which is stored on the infected system.
In order to prevent a computer system from such vulnerabilities, it is important to take some early prevention. Here is a list of SlingShot Malware protection tips –
Subscribe to our newsletter today to receive updates on the Latest News and Threats.
The researchers at Virus Removal Guidelines are dedicated to track down the latest vulnerabilities which may infringe your system security. Our team of expert performs a detailed research about every malware infection before educating our users about the same.
Want to stay informed about the latest threats & malware? Sign up for our newsletter & learn how to get rid of all types of threats from your computer.