{"id":16848,"date":"2023-06-02T13:14:18","date_gmt":"2023-06-02T05:14:18","guid":{"rendered":"https:\/\/www.microdium.com\/public\/?p=16848"},"modified":"2023-06-02T13:14:18","modified_gmt":"2023-06-02T05:14:18","slug":"ma-940-052023-mycert-advisory-snake-malware-threat-from-russian-cyber-actors","status":"publish","type":"post","link":"https:\/\/www.microdium.com\/public\/2023\/06\/02\/ma-940-052023-mycert-advisory-snake-malware-threat-from-russian-cyber-actors\/","title":{"rendered":"MA-940.052023: MyCERT Advisory &#8211; Snake Malware Threat From Russian Cyber Actors"},"content":{"rendered":"<p><strong>1.0 Introduction<\/strong><\/p>\n<p>Recently, The US Cybersecurity &amp; Infrastructure Security Agency (CISA) and partners released a joint advisory for a sophisticated cyber espionage tool used by Russian cyber actors. The advisory titled\u00a0<a href=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa23-129a\" target=\"_blank\" rel=\"noopener\">Hunting Russian Intelligence \u201cSnake\u201d Malware<\/a>\u00a0provides technical descriptions of the malware\u2019s host architecture and network communications, and mitigations to help detect and defend against this threat.<\/p>\n<p><strong>2.0 Impact<\/strong><br \/>\nSnake can be considered to be the most sophisticated cyber espionage tool designed and used for long-term intelligence collection on sensitive targets. The sophistication of Snake stems from three principal areas.<\/p>\n<p>First, Snake employs means to achieve a rare level of stealth in its host components and network communications.<\/p>\n<p>Second, Snake\u2019s internal technical architecture allows for easy incorporation of new or replacement components. This design also facilitates the development and interoperability of Snake instances running on different host operating systems. We have observed interoperable Snake implants for Windows, MacOS, and Linux operating systems.<\/p>\n<p>Lastly, Snake demonstrates careful software engineering design and implementation, with the implant containing surprisingly few bugs given its complexity.<\/p>\n<p><strong>3.0 Affected Products<\/strong><br \/>\nWindows, MacOS, and Linux operating systems.<\/p>\n<p><strong>4.0 Recommendations<\/strong><br \/>\nMyCERT urges organizations to review the\u00a0<a href=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa23-129a\" target=\"_blank\" rel=\"noopener\">advisory<\/a>\u00a0for more information and apply the recommended mitigations and detection guidance.<\/p>\n<p>Kindly refer to\u00a0<a href=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa23-129a\" target=\"_blank\" rel=\"noopener\">https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa23-129a<\/a>\u00a0for more information on Snake malware.<\/p>\n<p>Generally, MyCERT advises the users of this devices to be updated with the latest security announcements by the vendor and follow best practice security policies to determine which updates should be applied.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>1.0 Introduction Recently, The US Cybersecurity &amp; Infrastructure Security Agency (CISA) and partners released a joint advisory for a sophisticated cyber espionage tool used by Russian cyber actors. The advisory titled\u00a0Hunting Russian Intelligence \u201cSnake\u201d Malware\u00a0provides technical descriptions of the malware\u2019s host architecture and network communications, and mitigations to help detect and defend against this threat. [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":16849,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-16848","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-disaster-recovery-cybersecurity-news-malaysia"],"_links":{"self":[{"href":"https:\/\/www.microdium.com\/public\/wp-json\/wp\/v2\/posts\/16848","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microdium.com\/public\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microdium.com\/public\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microdium.com\/public\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microdium.com\/public\/wp-json\/wp\/v2\/comments?post=16848"}],"version-history":[{"count":1,"href":"https:\/\/www.microdium.com\/public\/wp-json\/wp\/v2\/posts\/16848\/revisions"}],"predecessor-version":[{"id":16850,"href":"https:\/\/www.microdium.com\/public\/wp-json\/wp\/v2\/posts\/16848\/revisions\/16850"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microdium.com\/public\/wp-json\/wp\/v2\/media\/16849"}],"wp:attachment":[{"href":"https:\/\/www.microdium.com\/public\/wp-json\/wp\/v2\/media?parent=16848"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.microdium.com\/public\/wp-json\/wp\/v2\/categories?post=16848"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microdium.com\/public\/wp-json\/wp\/v2\/tags?post=16848"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}