Security Firms say they’ve discovered a highly advanced and targeted cyber-espionage campaign that appears to have been running since 2011. The group’s malware references “Sauron” in its configuration files, Kaspersky Lab says. The malware is designed to be stealthy, for example remaining hidden until specified network protocols awaken it. Symantec says it’s found 36 infections in seven organizations, across four countries, involving “a number of organizations and individuals located in Russia, an airline in China, an organization in Sweden and an embassy in Belgium””]
Source: https://www.cuinfosecurity.com/espionage-malware-penetrates-air-gapped-networks-a-9331

