Did you like this?
friends and colleagues.
By: Kim Zetter, WIRED
A newly uncovered espionage tool, apparently designed by the same people behind the state-sponsored Flame malware that infiltrated machines in Iran, has been found infecting systems in other countries in the Middle East, according to researchers.
The malware, which steals system information but also has a mysterious payload that could be destructive against critical infrastructure, has been found infecting at least 2,500 machines, most of them in Lebanon, according to Russia-based security firm Kaspersky Lab, which discovered the malware in June and published an extensive analysis of it on Thursday.
The spyware, dubbed Gauss after a name found in one of its main files, also has a module that targets bank accounts in order to capture login credentials. The malware targets accounts at several banks in Lebanon, including the Bank of Beirut, EBLF, BlomBank, ByblosBank, FransaBank and Credit Libanais. It also targets customers of Citibank and PayPal.
Related Business News Articles
Kaspersky Lab Receives Highest Level of Support Staff Certifications from TSIA and Miller Heiman Group
Kaspersky Lab North America announced today that its business products technical support and premium services teams were awarded the highest level of certification at the Technology Services World (TSW) conference in Las Vegas.Learn more >
Fulfilling its mission to share cybersecurity knowledge, Kaspersky Lab launched today the Industrial Control Systems Computer Emergency Response Team (also known as Kaspersky Lab ICS-CERT) – a global CERT entity that welcomes collaboration with critical infrastructure operators, vendors and government institutions.Learn more >
Eugene Kaspersky Says the Worst Case Hacking Scenarios Probably Won't Happen - MotherboardLearn more >