The NSA Tips cover art

The NSA Tips

Hunting Russian Intelligence "Snake" Malware: May 2023

Preview

£0.00 for first 30 days

Try for £0.00
Pick 1 audiobook a month from our unmatched collection - including bestsellers and new releases.
Listen all you want to thousands of included audiobooks, Originals, celeb exclusives, and podcasts.
Access exclusive sales and deals.
£7.99/month after 30 days. Renews automatically. See here for eligibility.

The NSA Tips

By: National Security Agency
Narrated by: Tom Brooks
Try for £0.00

£7.99/month after 30 days. Renews automatically. See here for eligibility.

Buy Now for £11.99

Buy Now for £11.99

Confirm Purchase
Pay using card ending in
By completing your purchase, you agree to Audible's Conditions of Use and authorise Audible to charge your designated card or any other card on file. Please see our Privacy Notice, Cookies Notice and Interest-based Ads Notice.
Cancel

About this listen

The Snake implant is considered the most sophisticated cyber espionage tool designed and used by Center 16 of Russia’s Federal Security Service (FSB) for long-term intelligence collection on sensitive
targets. To conduct operations using this tool, the FSB created a covert peer-to-peer (P2P) network of numerous Snake-infected computers worldwide. Many systems in this P2P network serve as relay nodes which route disguised operational traffic to and from Snake implants on the FSB’s ultimate targets. Snake’s custom communications protocols employ encryption and fragmentation for confidentiality and are designed to hamper detection and collection efforts.

We have identified Snake infrastructure in over 50 countries across North America, South America, Europe, Africa, Asia, and Australia, to include the United States and Russia itself. Although Snake uses infrastructure across all industries, its targeting is purposeful and tactical in nature. Globally, the FSB has used Snake to collect sensitive intelligence from high-priority targets, such as government networks, research facilities, and journalists. As one example, FSB actors used Snake to access and exfiltrate sensitive international relations documents, as well as other diplomatic communications, from a victim in a North Atlantic Treaty Organization (NATO) country. Within the United States, the FSB has victimized industries including education, small businesses, and media organizations, as well as critical infrastructure sectors including government facilities, financial services, critical manufacturing, and communications.

PLEASE NOTE: When you purchase this title, the accompanying PDF will be available in your Audible Library along with the audio.

©2023 Tom Brooks (P)2023 Tom Brooks
Security & Encryption Computer Security
activate_Holiday_promo_in_buybox_DT_T2

Listeners also enjoyed...

Computer Programming: The Doctrine: An Introduction to the Language of Computer Programming cover art
Kali Linux for Beginners cover art
SQL: From Beginner to Intermediate cover art
ASP.NET: Programming Success in a Day cover art
Kubernetes Handbook: Non-Programmer’s Guide to Deploy Applications with Kubernetes cover art
Pipeline as Code: Continuous Delivery with Jenkins, Kubernetes, and Terraform cover art
Hacking for Beginners cover art
Microservices with Kubernetes: Non-Programmer’s Handbook cover art
Python for Beginners 2020 cover art
A Comprehensive Introduction to Computer Systems and Beyond cover art
Computer Science 2.0 Beginners Crash Course cover art
CISSP Exam Audio Study Guide! Practice Questions Edition! cover art
Programming for Beginners: 2 Book in 1 cover art
Microservices Security in Action cover art
CompTIA Network+: Study Guide for the CompTIA Network+ Certification cover art
Computer Hacking Beginners Guide cover art

What listeners say about The NSA Tips

Average customer ratings

Reviews - Please select the tabs below to change the source of reviews.