A group of Russian-speaking hackers that has targeted politicians, state entities, and companies over the past eight years is continuing to develop its skills, according to an analysis by security researchers. Also Read: Top 10 Black Hat Hackers Who Made History Forever According to observations of “Kaspersky Lab”, the Russian-language Sofacy is not scaling down its activities, even though in 2014 received wide publicity. On the contrary, the group is expanding its arsenal of new and more sophisticated techniques to successfully carry out the infection and better conceal traces in the system.
Hackers Developing Skills While Hacking Politicians And Big Companies
Also Read: Best WiFi Hacking Apps For Android The group, known under Fancy Bear, Sednit, STRONTIUM and APT28, has been operating since at least 2008. Its purpose are mainly military enterprises and government agencies around the world. New tools Sofacy, found experts “Kaspersky Lab”, have the property of interchangeability. This means that the victim’s computer becomes infected with several malwares, one can recover the rest if they block or remove protection system. Grouping Sofacy earlier sought to increase the stability of malware installing two backdoor, so that in the event of one of these attackers still remains access to the system. But now Sofacy acts more sophisticated – with a separate module from the command server downloads a new version of a locked backdoor that allows you not to start the process of re-infection of the system, and to continue it with the place where the malware was blocked. Also Read: How to Hack Wifi On Android Another new method which, according to observations of “Kaspersky Lab”, is increasingly using Sofacy, – this division of malicious software into modules with functions more reliably conceals their activity in the attacked system. Also Read: 12 Best Android Hacking Apps In addition, Sofacy improving ways of stealing data from computers that are not connected to the Internet. Attackers create new versions of modules that allow in stealth mode to copy data from USB-devices, which were previously used on computers that are denied access to the network.