{"id":3886,"date":"2016-10-31T17:59:17","date_gmt":"2016-10-31T21:59:17","guid":{"rendered":"http:\/\/community.mis.temple.edu\/itacs5211fall16\/?p=3886"},"modified":"2016-10-31T17:59:17","modified_gmt":"2016-10-31T21:59:17","slug":"projectsauron","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/2016\/10\/31\/projectsauron\/","title":{"rendered":"ProjectSauron"},"content":{"rendered":"<p>A couple of months ago, Symantec and Kaspersky Labs discovered a malware called ProjectSauron or Strider. \u00a0 It was capable of harvesting passwords of entire networks since 2011. \u00a0It had separate modules designed to perform specific functions like stealing documents or recording keystrokes. \u00a0It is also highly selective in its target, currently only infecting 36 computers across 7 organizations in 4 different countries (Belgium, Sweden, Russia, and China). \u00a0ProjectSauron has been, until recently, undetected by some of the most advanced IDS\/IPS systems available.<\/p>\n<p>Symantec and Kaspersky is acknowledging that this may be state-sponsored malware, used for specific targets to gather military intelligence, because of the complexity of the technology used which may have caused millions of dollars to develop.<\/p>\n<p>You can read more here:\u00a0https:\/\/www.rt.com\/news\/355165-sauron-malware-cyber-espionage\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A couple of months ago, Symantec and Kaspersky Labs discovered a malware called ProjectSauron or Strider. \u00a0 It was capable of harvesting passwords of entire networks since 2011. \u00a0It had separate modules designed to perform specific functions like stealing documents or recording keystrokes. \u00a0It is also highly selective in its target, currently only infecting 36 [&hellip;]<\/p>\n","protected":false},"author":8346,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-3886","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-uncategorized","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3886","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/users\/8346"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/comments?post=3886"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3886\/revisions"}],"predecessor-version":[{"id":3887,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3886\/revisions\/3887"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/media?parent=3886"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/categories?post=3886"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/tags?post=3886"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}