『The NSA Tips』のカバーアート

The NSA Tips

Hunting Russian Intelligence "Snake" Malware: May 2023

プレビューの再生
¥1,429で会員登録し購入 ¥1,330で会員登録し購入
期間限定:2025年12月1日(日本時間)に終了
2025年12月1日までプレミアムプランが3か月 月額99円キャンペーン開催中。300円分のKindle本クーポンも。 *適用条件あり。詳細はこちら
オーディオブック・ポッドキャスト・オリジナル作品など数十万以上の対象作品が聴き放題。
オーディオブックをお得な会員価格で購入できます。
会員登録は4か月目以降は月額1,500円で自動更新します。いつでも退会できます。
オーディオブック・ポッドキャスト・オリジナル作品など数十万以上の対象作品が聴き放題。
オーディオブックをお得な会員価格で購入できます。
30日間の無料体験後は月額¥1500で自動更新します。いつでも退会できます。

The NSA Tips

著者: National Security Agency
ナレーター: Tom Brooks
¥1,429で会員登録し購入 ¥1,330で会員登録し購入

期間限定:2025年12月1日(日本時間)に終了

30日間の無料体験後は月額¥1500で自動更新します。いつでも退会できます。

¥1,900 で購入

¥1,900 で購入

このコンテンツについて

The Snake implant is considered the most sophisticated cyber espionage tool designed and used by Center 16 of Russia’s Federal Security Service (FSB) for long-term intelligence collection on sensitive
targets. To conduct operations using this tool, the FSB created a covert peer-to-peer (P2P) network of numerous Snake-infected computers worldwide. Many systems in this P2P network serve as relay nodes which route disguised operational traffic to and from Snake implants on the FSB’s ultimate targets. Snake’s custom communications protocols employ encryption and fragmentation for confidentiality and are designed to hamper detection and collection efforts.

We have identified Snake infrastructure in over 50 countries across North America, South America, Europe, Africa, Asia, and Australia, to include the United States and Russia itself. Although Snake uses infrastructure across all industries, its targeting is purposeful and tactical in nature. Globally, the FSB has used Snake to collect sensitive intelligence from high-priority targets, such as government networks, research facilities, and journalists. As one example, FSB actors used Snake to access and exfiltrate sensitive international relations documents, as well as other diplomatic communications, from a victim in a North Atlantic Treaty Organization (NATO) country. Within the United States, the FSB has victimized industries including education, small businesses, and media organizations, as well as critical infrastructure sectors including government facilities, financial services, critical manufacturing, and communications.

PLEASE NOTE: When you purchase this title, the accompanying PDF will be available in your Audible Library along with the audio.

©2023 Tom Brooks (P)2023 Tom Brooks
インターネットセキュリティ・プライバシー セキュリティ・暗号化
まだレビューはありません