A newly uncovered cyber-espionage malware tool is turning PCs into listening posts, enabling attackers to listen into conversations and take photos using the compromised machine.
Dubbed InvisiMole, the campaign has been active since 2013 but has only just been uncovered -- highlighting the especially stealthy nature of the attacks.
The malware has been detailed by researchers at ESET, after being discovered on compromised computers in Ukraine and Russia. It's believed that the campaign is highly targeted, with just a few dozen computers affected, but that the targets are high-profile and high-value to the attackers.
ESET said the malware turns the affected computer "into a video camera, letting the attackers see and hear what's going on in the victim's office or wherever their device may be".
Those behind the campaign have managed to cover their tracks so well that researchers are unsure who is behind InvisiMole, but one thing is for certain: the powerful nature of the tool puts it up there with spying campaigns conducted by some of the most sophisticated groups.
"InvisiMole is fully-equipped spyware whose rich capabilities can surely compete with other espionage tools seen in the wild," said Zuzana Hromcová, malware analyst at ESET.
See also: Ransomware: An executive guide to one of the biggest menaces on the web
See: 17 tips for protecting Windows computers and Macs from ransomware (free PDF)
All of this information can be extracted to a command and control server run by the attackers, to be used for whatever nefarious purposes the cyber-espionage campaign is being carried out for. Attackers can also track the exact location of a device -- a useful tactic, if the infected computer is a laptop and is being transported around.
"InvisiMole is capable of scanning enabled wireless networks on the compromised system. It records information such as the SSID and MAC address of the visible Wi-Fi access points. This data can then be compared to public databases, letting the attackers track the geolocation of the victim," said Hromcová.
As the campaign has only just been uncovered, it is likely to still be actively carrying out attacks against its specially selected targets. Researchers have posted a full list of Indicators of Compromise.
READ MORE MORE CYBER SECURITY