Snake (malware)
{{Short description|Russian malware}}
{{Infobox malware
| common_name = Snake
| image =
| caption =
| image2 =
| caption2 =
| technical_name =
| Aliases =
| Type =
| subtype =
| classification = Spyware
| family =
| isolation_date =
| Origin = Russia
| Author = Federal Security Service
| Date =
| Location =
| Theme =
| Target =
| outcome =
| losses =
| suspect =
| convicted =
| sentence =
| version =
| OS =
| package =
| filename =
| filetype =
| filesize =
| exploit =
| ports_used =
| language =
| discontinuation_date =
| version1 =
| OS1 =
| package1 =
| filename1 =
| filetype1 =
| filesize1 =
| exploit1 =
| ports_used1 =
| language1 =
| discontinuation_date1 =
}}
Snake was malware developed by the Federal Security Service of Russia. It was one of the most used tools by FSB's Center 16 and formed a part of the Turla toolset.{{Cite web |date=2023-05-09 |title=Hunting Russian Intelligence "Snake" Malware {{!}} CISA |url=https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-129a |access-date=2024-03-09 |website=www.cisa.gov |language=en}} It saw use in at least 50 countries, being employed to collect data from government networks, diplomatic communication and research facilities.{{Cite web |date=2023-04-19 |title=The Epic Turla (snake/Uroburos) attacks |url=https://www.kaspersky.com/resource-center/threats/epic-turla-snake-malware-attacks |access-date=2024-03-09 |website=www.kaspersky.com |language=en}}{{Cite web |last=Skulmoski |first=Greg |date=2023-05-11 |title=It’s being called Russia’s most sophisticated cyber espionage tool. What is Snake, and why is it so dangerous? |url=http://theconversation.com/its-being-called-russias-most-sophisticated-cyber-espionage-tool-what-is-snake-and-why-is-it-so-dangerous-205405 |access-date=2024-03-09 |website=The Conversation |language=en-US}}
History
Its development began in 2003 as “Uroburos”. By early 2004, development was finished and cyber operations using the malware had started.{{Cite web |title=Snake Malware |url=https://atos.net/en/lp/securitydive/snake-malware |access-date=2024-03-09 |website=Atos |language=en-US}} On 8 May 2023, under Operation MEDUSA, the FBI and other agencies took down Snake's infrastructure.{{Cite web |date=2023-05-09 |title=Office of Public Affairs {{!}} Justice Department Announces Court-Authorized Disruption of Snake Malware Network Controlled by Russia’s Federal Security Service {{!}} United States Department of Justice |url=https://www.justice.gov/opa/pr/justice-department-announces-court-authorized-disruption-snake-malware-network-controlled |access-date=2024-03-09 |website=www.justice.gov |language=en}}{{Cite web |title=National Security Agency/Central Security Service > Press Room > Press Releases & Statements > Press Release View |url=https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3389044/us-agencies-and-allies-partner-to-identify-russian-snake-malware-infrastructure/ |access-date=2024-03-09 |website=www.nsa.gov}}