Not only are Snake’s tools more advanced and robust. They tend to focus their attacks on much harder targets, such as military organizations, research and academic institutions, multinational corporations (especially those with government contracts), intelligence agencies, embassies and other well-guarded government institutions.
Traditionally, Snake’s attacks have focused on Windows, and the malware they have designed has been optimized for that platform. However, researchers from Kaspersky Lab found several Linux components in their toolkit, which suggests that the group is expanding their reach to other platforms as well.
Even more disturbing, the Dutch security firm Fox-IT has recently found a macOS variant of the toolkit that appears to be a direct port from the Windows version.
It should be noted that no mac-oriented malware based on this code has yet been found in the wild, which suggests that this toolkit represents a beta that’s still in testing.
Even if that theory is correct, however, it’s just a matter of time before the group completes its testing and begins making attacks to flex their newfound muscle.
That’s disturbing because high-level executives disproportionately use Macs, and a focused attack against Mac users will almost certainly be launched with them in mind as the primary targets. Even worse, Snake is best known for using Zero-Day exploits to carry out their attacks, which makes them extremely difficult to defend against. Stay vigilant. No one can say with certainty when or where the group will strike next.