Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      TechCentral's South African Newsmakers of 2025

      TechCentral’s South African Newsmakers of 2025

      18 December 2025
      Malatsi buries Post Office's long-dead monopoly

      Malatsi buries Post Office monopoly the market ignored

      18 December 2025
      China races to crack EUV as chip war with the West intensifies

      China races to crack EUV lithography as chip war with the West intensifies

      18 December 2025
      Coursera to buy Udemy, in which Prosus is an investor

      Coursera to buy Udemy, in which Prosus is an investor

      18 December 2025
      It has been a year of policy victories, but crypto firms warn momentum could fade without durable US legislation.- Donald Trump

      Crypto’s Trump-era boom faces a 2026 reality check

      18 December 2025
    • World
      Warner Bros slams the door on Paramount

      Warner Bros slams the door on Paramount

      17 December 2025
      X moves to block bid to revive Twitter brand

      X moves to block bid to revive Twitter brand

      17 December 2025
      Oracle’s AI ambitions face scrutiny on earnings miss

      Oracle’s AI ambitions face scrutiny on earnings miss

      11 December 2025
      China will get Nvidia H200 chips - but not without paying Washington first

      China will get Nvidia H200 chips – but not without paying Washington first

      9 December 2025
      IBM reportedly close to $11-billion deal to buy Confluent - Arvind Krishna

      IBM reportedly close to $11-billion deal to buy Confluent

      8 December 2025
    • In-depth
      Black Friday goes digital in South Africa as online spending surges to record high

      Black Friday goes digital in South Africa as online spending surges to record high

      4 December 2025
      Canal+ plays hardball - and DStv viewers feel the pain

      Canal+ plays hardball – and DStv viewers feel the pain

      3 December 2025
      Jensen Huang Nvidia

      So, will China really win the AI race?

      14 November 2025
      Valve's Linux console takes aim at Microsoft's gaming empire

      Valve’s Linux console takes aim at Microsoft’s gaming empire

      13 November 2025
      iOCO's extraordinary comeback plan - Rhys Summerton

      iOCO’s extraordinary comeback plan

      28 October 2025
    • TCS
      TCS+ | Africa's digital transformation - unlocking AI through cloud and culture - Cliff de Wit Accelera Digital Group

      TCS+ | Cloud without culture won’t deliver AI: Accelera’s Cliff de Wit

      12 December 2025
      TCS+ | How Cloud on Demand helps partners thrive in the AWS ecosystem - Odwa Ndyaluvane and Xenia Rhode

      TCS+ | How Cloud On Demand helps partners thrive in the AWS ecosystem

      4 December 2025
      TCS | MTN Group CEO Ralph Mupita on competition, AI and the future of mobile

      TCS | Ralph Mupita on competition, AI and the future of mobile

      28 November 2025
      TCS | Dominic Cull on fixing South Africa's ICT policy bottlenecks

      TCS | Dominic Cull on fixing South Africa’s ICT policy bottlenecks

      21 November 2025
      TCS | BMW CEO Peter van Binsbergen on the future of South Africa's automotive industry

      TCS | BMW CEO Peter van Binsbergen on the future of South Africa’s automotive industry

      6 November 2025
    • Opinion
      Netflix, Warner Bros deal raises fresh headaches for MultiChoice - Duncan McLeod

      Netflix, Warner Bros deal raises fresh headaches for MultiChoice

      5 December 2025
      BIN scans, DDoS and the next cybercrime wave hitting South Africa's banks - Entersekt Gerhard Oosthuizen

      BIN scans, DDoS and the next cybercrime wave hitting South Africa’s banks

      3 December 2025
      Your data, your hardware: the DIY AI revolution is coming - Duncan McLeod

      Your data, your hardware: the DIY AI revolution is coming

      20 November 2025
      Zero Carbon Charge founder Joubert Roux

      The energy revolution South Africa can’t afford to miss

      20 November 2025
      It's time for a new approach to government IT spend in South Africa - Richard Firth

      It’s time for a new approach to government IT spend in South Africa

      19 November 2025
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • LSD Open
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Sections » Information security » What is Russia’s Snake malware, and why is it so dangerous?

    What is Russia’s Snake malware, and why is it so dangerous?

    It’s being called Russia’s most sophisticated cyber espionage tool. But what is it?
    By The Conversation12 May 2023
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    Like most people, I check my e-mails in the morning, wading through a combination of work requests, spam and news alerts peppering my inbox.

    But yesterday brought something different and deeply disturbing. I noticed an alert from the American Cybersecurity and Infrastructure Security Agency (CISA) about some very devious malware that had infected a network of computers.

    The malware in question is Snake, a cyber espionage tool deployed by Russia’s Federal Security Service that has been around for about 20 years.

    According to CISA, the Snake implant is the “most sophisticated cyber espionage tool designed and used by Centre 16 of Russia’s Federal Security Service for long-term intelligence collection on sensitive targets”.

    The stealthy Snake

    The Russian Federal Security Service developed the Snake network in 2003 to conduct global cyber espionage operations against Nato, companies, research institutions, media organisations, financial services, government agencies and more.

    So far, it has been detected on Windows, Linux and macOS computers in more than 50 countries.

    Elite Russian cyber espionage teams put the malware on a target’s computer, copy sensitive information of interest and then send it to Russia. It’s a simple concept, cloaked in masterful technical design.

    Since its creation, Russian cyber spies have regularly upgraded the Snake malware to avoid detection. The current version is cunning in how it persistently evades detection and protects itself.

    Moreover, the Snake network can disrupt critical industrial control systems that manage our buildings, hospitals, energy systems, water and wastewater systems, among others – so the risks went beyond just intelligence collection.

    Snake hunting

    On 9 May, the US department of justice announced the Federal Bureau of Investigation had finally disrupted the global Snake peer-to-peer network of infected computers.

    The covert network allowed infected computers to collect sensitive information. The Snake malware then disguised the sensitive information through sophisticated encryption, and sent it to the spy masters.

    Since the Snake malware used custom communication protocols, its covert operations remained undetected for decades. You can think of custom protocols as a way to transmit information so it can go undetected.

    However, with Russia’s war in Ukraine and the rise in cybersecurity activity over the past few years, the FBI has increased its monitoring of Russian cyber threats.

    While the Snake malware is an elegantly designed piece of code, it is complex and needs to be precisely deployed to avoid detection. According to the department of justice’s press release, Russian cyber spies were careless in more than a few instances and did not deploy it as designed.

    As a result, the Americans discovered Snake, and crafted a response.

    Snake bites

    The FBI received a court order to dismantle Snake as part of an operation code-named Medusa.

    They developed a tool called Perseus that causes the Snake malware to disable itself and stop further infection of other computers. The Perseus tool and instructions are freely available to guide detection, patching and remediation.

    The department of justice advises that Perseus only stops this malware on computers that are already infected; it does not patch vulnerabilities on other computers, or search for and remove other malware.

    Even though the Snake network has been disrupted, the department warned vulnerabilities may still exist for users, and they should follow safe cybersecurity hygiene practices.

    Snakebite treatment

    Fortunately, effective cybersecurity hygiene isn’t overly complicated. Microsoft has identified five activities that protect against 98% of cybersecurity attacks, whether you’re at home or work.

    • Enable multi-factor authentication across all your online accounts and apps. This login process requires multiple steps such as entering your password, followed by a code received through an SMS message – or even a biometric fingerprint or secret question (favourite drummer? Ringo!).
    • Apply “zero trust” principles. It’s best practice to authenticate, authorise and continuously validate all system users (internal and external) to ensure they have the right to use the systems. The zero-trust approach should be applied whether you’re using computer systems at work or home.
    • Use modern anti-malware programs. Anti-malware, also known as antivirus software, protects and removes malware from our systems, big and small.
    • Keep up to date. Regular system and software updates not only help keep new applications secure, but also patch vulnerable areas of your system.
    • Protect your data. Make a copy of your important data, whether it’s a physical printout or on an external device disconnected from your network, such as an external drive or USB.

    We can expect malicious cyberattacks to increase in the future, and their impact will only become more severe. The Snake malware is a sophisticated piece of software that raises yet another concern. But in this case, we have the antidote and can protect ourselves by proactively following the above steps.

    If you have concerns about the Snake malware you can read more here, or speak to your IT service desk.The Conversation

    • Written by Greg Skulmoski, associate professor, project management, Bond University
    • This article is republished from The Conversation under a Creative Commons licence

    Get TechCentral’s daily newsletter



    Subscribe to TechCentral Subscribe to TechCentral
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleSeacom hit by ‘cybersecurity incident’
    Next Article TCS+ | Data is key to any CX strategy: key insights from CallMiner

    Related Posts

    TechCentral's South African Newsmakers of 2025

    TechCentral’s South African Newsmakers of 2025

    18 December 2025
    Malatsi buries Post Office's long-dead monopoly

    Malatsi buries Post Office monopoly the market ignored

    18 December 2025
    China races to crack EUV as chip war with the West intensifies

    China races to crack EUV lithography as chip war with the West intensifies

    18 December 2025
    Company News
    Why TechCentral is the most powerful platform for reaching IT decision makers

    Why TechCentral is the most powerful platform for reaching IT decision makers

    17 December 2025
    Business trends to watch in 2026 - Domains.co.za

    Business trends to watch in 2026

    17 December 2025
    MTN Zambia launches world's first 4G cloud smartphone solution - Huawei

    MTN Zambia launches world’s first 4G cloud smartphone solution

    17 December 2025
    Opinion
    Netflix, Warner Bros deal raises fresh headaches for MultiChoice - Duncan McLeod

    Netflix, Warner Bros deal raises fresh headaches for MultiChoice

    5 December 2025
    BIN scans, DDoS and the next cybercrime wave hitting South Africa's banks - Entersekt Gerhard Oosthuizen

    BIN scans, DDoS and the next cybercrime wave hitting South Africa’s banks

    3 December 2025
    Your data, your hardware: the DIY AI revolution is coming - Duncan McLeod

    Your data, your hardware: the DIY AI revolution is coming

    20 November 2025

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    TechCentral's South African Newsmakers of 2025

    TechCentral’s South African Newsmakers of 2025

    18 December 2025
    Malatsi buries Post Office's long-dead monopoly

    Malatsi buries Post Office monopoly the market ignored

    18 December 2025
    China races to crack EUV as chip war with the West intensifies

    China races to crack EUV lithography as chip war with the West intensifies

    18 December 2025
    Coursera to buy Udemy, in which Prosus is an investor

    Coursera to buy Udemy, in which Prosus is an investor

    18 December 2025
    © 2009 - 2025 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}