US reveals bespoke tool that took down Russian malware operation
Snake had been used to steal NATO countries’ data for 20 years


The US Department of Justice (DoJ) has revealed details of a joint operation in which Western agencies used a custom tool to destroy a decades-old Russian malware operation.
Use of a tool named ‘PERSEUS’ nullified a worldwide network of devices that had been infected with the Snake malware by threat actors in the group Turla.
A number of agencies including the NSA, FBI, and the Cybersecurity and Infrastructure Security Agency (CISA) led the operation codenamed ‘Medusa’.
Snake had been used to exfiltrate sensitive information from devices across 50 or more countries, including NATO governments and journalists, but the FBI-created PERSEUS was used to force the malware to overwrite its data without damaging infected devices.
Turla has been linked directly with the Federal Security Service of the Russian Federation (FSB) and has used Snake since 2003.
“For 20 years, the FSB has relied on the Snake malware to conduct cyber espionage against the United States and our allies – that ends today,” said Matthew G. Olsen, assistant attorney general, at the Justice Department’s National Security Division.
“The Justice Department will use every weapon in our arsenal to combat Russia’s malicious cyber activity, including neutralizing malware through high-tech operations, making innovative use of legal authorities, and working with international allies and private sector partners to amplify our collective impact.”
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
RELATED RESOURCE
How to reduce the risk of phishing and ransomware
Top security concerns and tips for mitigation
Snake is able to function on Windows, macOS, and Linux under a high level of stealth, and has been operated in a tactical manner to hit specific targets.
It was found and destroyed on multiple US-based systems through a search warrant authorizing remote access to computers believed to have been compromised by the malware.
On some occasions, Turla was observed to have sent Snake to victims multiple times to ensure infection and exfiltration of data.
A joint cyber security advisory by the agencies described the malware as “the most sophisticated cyber espionage tool in the FSB’s arsenal”.
The malware’s network communications are encrypted and fragmented, and it has its own HTTP and TCP protocols that have allowed it to operate unseen on top legitimate networks.
In the wild, it has been found intercepting each client-to-server packet in a TCP session to check for Snake-specific instructions.
Snake can redirect all relevant packets to its own process function while redirecting all other packets to their respective applications to avoid detection.
Turla, based in Russia, has previously hijacked Iranian cyber espionage resources to launch masked attacks on Western victims.
Researchers at Microsoft Threat Intelligence, which tracks Turla under the name Secret Blizzard, also included findings that the group engaged in cyber warfare across Ukraine in its report marking a year since Russia’s invasion.
The DoJ has urged organizations to review its joint advisory for advice on Snake detection and remediation.
It noted that a keylogger has often been deployed with Snake, which hackers could use to steal passwords even after the first malware package has been nullified.

Rory Bathgate is Features and Multimedia Editor at ITPro, overseeing all in-depth content and case studies. He can also be found co-hosting the ITPro Podcast with Jane McCallion, swapping a keyboard for a microphone to discuss the latest learnings with thought leaders from across the tech sector.
In his free time, Rory enjoys photography, video editing, and good science fiction. After graduating from the University of Kent with a BA in English and American Literature, Rory undertook an MA in Eighteenth-Century Studies at King’s College London. He joined ITPro in 2022 as a graduate, following four years in student journalism. You can contact Rory at rory.bathgate@futurenet.com or on LinkedIn.
-
Bigger salaries, more burnout: Is the CISO role in crisis?
In-depth CISOs are more stressed than ever before – but why is this and what can be done?
By Kate O'Flaherty Published
-
Cheap cyber crime kits can be bought on the dark web for less than $25
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.
By Emma Woollacott Published
-
Hackers are lying low in networks to wage critical infrastructure attacks - here’s how they do it
News Hackers are researching key IT workers in their bid to gain access to vital systems
By Steve Ranger Published
-
ASUS, Cisco, Netgear devices exploited in ongoing Chinese hacking campaign
News Critical national infrastructure is the target of sustained attempts from state-sponsored hackers, according to Five Eyes advisories
By Ross Kelly Published
-
Move away from memory-unsafe languages like C and C++, NSA urges
News The US agency advises organisations to begin using languages like Rust, Java, and Swift
By Zach Marzouk Published
-
US gov issues fresh warning over Russian threat to critical infrastructure
News The FBI, NSA and CISA have urged network defenders to be on "heightened alert" for Russian cyber attacks
By Connor Jones Published
-
NSA warns smartphone users of ‘large scale data tracking’
News Common features like Bluetooth and Wi-Fi can reveal sensitive details about users like their daily routines
By Keumars Afifi-Sabet Published
-
NSA hands serious flaw to Microsoft rather than use it
News Patch Windows 10 now, as the NSA has spotted a bug impacting security certificates
By Nicole Kobie Published
-
100GB of secret NSA data found on unsecured AWS S3 bucket
News The data related to a failed NSA cloud collaboration project
By Adam Shepherd Published
-
Kaspersky claims pirated Office software was behind NSA exploit leak
News The company has released the early results of its investigation into the 2014 incident
By Adam Shepherd Published