"Gazer- Spying on Ministries and Embassies!"

Welcome back dear readers to the NewAgeInformers.

    Hope you all are following us for new updates and news coming day-by-day. Today we will be going to talk about a new type of Malware which is targeting different Government ministries and embassies all over the globe. As we all know that since past 6-8 months there were so many cyber attacks taking place over the entire globe by the malicious attackers intending to harm the machines for getting money. Here, we will be discussing one of that which you would have had heard hardly. Yes, I am going to discuss about that attack which was not disclosed that much to all humans.


    I hope you all know about ESET, right? If someone does not know about it then I will let you know what is ESET? ESET is a well known company in the field of IT and security which provides different kinds of firewalls and anti-viruses type products in the world. So, according to the researchers of ESET, there is a new malware which is making government Ministries and Embassies their objective. By this, the attackers are spying on the Government's work and diplomats of the government working on different projects. ESET researchers named this malware as 'Gazer'. Based on their research, this malware is active since 2016. It was hoped that this Gazer was carried by a hacking group named Turla advanced persistent threat (APT), which was co-related with the intelligence department of Russia before.

    The researchers from the ESET are the very first researchers who had cited this malware to the entire globe. Since 2016, Gazer was used by the attackers to spy on the diplomats and the Ministries. Now let us discuss how this Gazer works? Actually it's a backdoor used to steal information from the systems. It is written in C++ programming language and have two stages for spying. In the first stage, it gets installed on any random machine on the network and then starts infecting the rest of the machines which are connected to that infected machine. After successful completion of first stage, in second stage it will get commands from Turla to control those servers which were negotiated in the first stage. The Senior Malware Researcher from ESET said that Turla can go to great lengths to avoid being detected on a system. Another researchers revealed," The complexity of tools used by Turla is quite high. We're seeing them really trying to change any type of data of strings (the binaries) so that we lose track of them. We are also observing that they fight back to modify the back-doors, so that it's harder to stop them and find them." The success ratio of Gazer can be demonstrated through advanced methods used to spy on its sighted targets, it has also the ability of being persistent (constant) on affected or targeted machine. It can hide itself from the victim's computer in order to spy and steal information as long as it can. According to the research, Gazer had infected the machines from the entire globe having more number of infected devices in Europe.

    The major difference between this recent attack and the past attacks from the Turla is that it makes and extra effort to evade detection by adjusting strings within its code, cleaning files securely,etc. Researchers requested to all the organizations to take practical threats serious and add different types of security layers to their machines in order to decrease the risk of being breached.
   
    Thanks for today, stay connected for more interesting updates by following us here:

facebook: CLICK HERE!!!!!!!!!!
Twitter: @NewAgeInformers
Instagram: @new_age_informers_



Comments