Cyberattacks on Air-Gapped Devices
This is a Belarus news story, published by Wired, that relates primarily to European Union news.
Belarus news
For more Belarus news, you can click here:
more Belarus newsNews about Us crime, violence, terrorism & cybercrime
For more Us crime, violence, terrorism & cybercrime news, you can click here:
more Us crime, violence, terrorism & cybercrime newsWired news
For more news from Wired, you can click here:
more news from WiredAbout the Otherweb
Otherweb, Inc is a public benefit corporation, dedicated to improving the quality of news people consume. We are non-partisan, junk-free, and ad-free. We use artificial intelligence (AI) to remove junk from your news feed, and allow you to select the best politics news, business news, entertainment news, and much more. If you like this article about Us crime, violence, terrorism & cybercrime, you might also like this article about
fellow security firm Kaspersky. We are dedicated to bringing you the highest-quality news, junk-free and ad-free, about your favorite topics. Please come every day to read the latest elaborate espionage platform news, espionage purposes news, news about Us crime, violence, terrorism & cybercrime, and other high-quality news about any topic that interests you. We are working hard to create the best news aggregator on the web, and to put you in control of your news feed - whether you choose to read the latest news through our website, our news app, or our daily newsletter - all free!
Kaspersky researchersWired
•A Mysterious Hacking Group Has 2 New Tools to Steal Data From Air-Gapped Machines
84% Informative
Two sophisticated toolkits used to steal data stored on air-gapped devices.
The devices are deliberately isolated from the internet or other networks to safeguard them from malware.
One of the custom tool collections was used starting in 2019 against a South Asian embassy in Belarus .
A largely different tool set was used three years later against a European Union government organization.
GoldenJackal is a toolkit composed of many different building blocks, written in multiple languages and capabilities.
The overall goal appears to be increased flexibility and resiliency in the event one module is detected by the target.
The highly modular approach is reminiscent of Red October , an elaborate espionage platform discovered in 2013 targeting hundreds of diplomatic, governmental, and scientific organizations.
VR Score
85
Informative language
84
Neutral language
55
Article tone
semi-formal
Language
English
Language complexity
76
Offensive language
not offensive
Hate speech
not hateful
Attention-grabbing headline
not detected
Known propaganda techniques
not detected
Time-value
medium-lived
External references
6
Source diversity
3
Affiliate links
no affiliate links