Title: Snake Malware, the Most Sophisticated Cyber Espionage Tool Designed and Used by Russia’s Federal Security Service (FSB)
The briefing addressed Russia’s “Snake” malware campaign, one of the most sophisticated cyber espionage tools designed and used by the Russian Federal Security Service (FSB), which was recently dismantled by the US Government and partners. The briefing covered the program’s history and its relation to other Russian cyber espionage programs and actors; discussed the strategic objectives of the program and victimology; touched on the technical aspects of the malware, its modularity, and how it was able to avoid detection; and concluded with lessons learned and issues to consider moving forward.
Peter Schroeder, Deputy Team Lead for the Strategic and Industry Analysis (SIA) Team, Accenture Cyber Threat Intelligence
Jonathan Zuramski, Malware Analyst, Accenture Cyber Threat Intelligence.
Mr. Peter Schroeder has been with Accenture Cyber Threat Intelligence (ACTI) since March 2023 and serves as the Deputy Team Lead for the Strategic and Industry Analysis (SIA) Team. On SIA, he also focuses on cyber threats in and from Russia, Europe, and Eurasia. Prior to coming to ACTI, Peter served in the US government in various intelligence analysis, policy, and management roles for nearly 18 years focused on Russia and Eurasia. He served at the US Embassy in Moscow, was the Principal Deputy National Intelligence Officer for Russia and Eurasia at the National Intelligence Council, and was a member of CIA’s Senior Analytic Service. He has managed large, high-profile analytic teams, led intelligence community-wide analytic programs, and authored national-level assessments and briefings for the most senior US government leaders. He speaks Russian and has a B.A. in History from the University of Virginia and an M.A. in Security Studies from Georgetown University.
Mr. Jonathan Zuramski is a cybersecurity professional currently serving as a Malware Analyst with Accenture Cyber Threat Intelligence. He graduated from the University of Maryland in 2021, where he specialized in Computer Science with a focus on Cyber Security. Jonathan began his career as a Cyber Security Analyst with the Fairfax County Government, where he managed their Endpoint Detection and Response tool and also created a malware analysis lab. His passion for malware research, cultivated during this time, continue to drive his work today.