A Different Kind of Equation, (Tue, Feb 17th)

Both the mainstream media and our security media is abuzz with Kasperksys disclosure of their research on the Equation group and the associated malware. You can find the original blog post here: http://www.kaspersky.com/about/news/virus/2015/equation-group-the-crown-creator-of-cyber-espionage

But if you want some real detail, check out the Q http://securelist.com/files/2015/02/Equation_group_questions_and_answers.pdf

Way more detail, and much more sobering to see that this group of malware goes all the way back to 2001, and includes code to map disconnected networks (using USB key CC like Stuxnet did), as well as the disk firmware facet thats everyones headline today.

Now, if only they included some Indicators of Compromise, something we can use to identify if our organizations or clients are affected … Stay tuned I guess ?

===================== Update ================

No sooner did I say stay tuned when I got this link, chock full of IoCs – or at least a decent start on them. Enjoy!

https://securelist.com/blog/research/68750/equation-the-death-star-of-malware-galaxy/

===============
Rob VandenBrink
Metafore

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

Reposted from SANS. View original.

CyberSafe-WP-Admin