Company was originally infected in September 2014.
By Dan Raywood
A cyber-attack targeted at the Swiss defense contractor RUAG used malware from the Turla family, which had no rootkit functionality, but relied on obfuscation to stay undetected.
In a technical analysis by the Reporting and Analysis Center for Information Assurance MELANI and the Swiss CERT, it found that the attackers showed great patience during the infiltration and lateral movement of the attack. RUAG had been affected by this threat since at least September 2014.
To read the entire article, please click here.