• Skip to primary navigation
  • Skip to main content
  • Skip to footer
Logo of Agilient Security Consultants, Australia

Agilient Security Consultants Australia

The Best Security Consultants

Menu
  • Industries
      • Aviation and Airport Security Consultants Australia
      • Defence Industry Security Consulting
      • Government Security Consulting
      • Healthcare & Hospitals Security Consulting
      • Corrections and Detention
      • Maritime Security Consultant
      • Aged Care Facilities
      • Mining, Oil & Gas
      • Public Venues & Events
      • Rail
      • School and Education Security Consultant
      • Telecommunications Security Consultant
      • Utilities
      • Places of Faith and Worship
    • advice-colleagues-communication-newIndustries
  • Services
      • Cybersecurity Consultants
      • Protective Security
      • Business Resilience
      • Building Security Consultants
      • Security Audits
      • Cyber Audits
      • Data
      • Pandemic Planning
      • Azure
      • Electronic Security
      • IT Disaster Recovery Planning
      • Business Continuity Consultants
      • Identity Theft Consultant​
      • Security Consultants
      • Security Camera and CCTV Consultant
      • ISO
      • Duress Alarms
      • Cloud
      • AWS
      • Awareness Training
      • Penetration Testing
      • Security Risk Assessment Consultants
      • Managed Security Service Provider
      • Protection against Vehicles as a Weapon
    • training-1Services
  • Locations
    • Security Consultant Melbourne
    • Security Consultant Sydney
    • Security Consultant Brisbane
    • Security Consultant Adelaide
    • Security Consultant Canberra
    • Security Consultant Perth
  • Resources
    • menumanagers-dealing-customer-agreTraining
    • working-together-newJoin The Tribe
    • Webinars_3-1.jpgUpcoming and Past Events
    • hacking-detected-shutterstock_newResources
  • Articles
  • About
    • About Us
      We are an Australian owned and operated security company specialising in risk, cybersecurity, protective security, crisis and business continuity management services.
    • frequently-asked-questions-smallFAQ’s
    • bg-menu-government-institutionsConsultant Registration
  • Contact Us
Contact Us

Slingshot APT – Advanced Persistent Threat Malware

You are here: Home / General / Slingshot APT – Advanced Persistent Threat Malware

For 6 years, Slingshot APT remained undetected in infected computers until it was discovered by Kaspersky Lab researchers in February of this year. Believed to have been active since as early as 2012, it has been found to be one of the most advanced malware attacks ever.

Slingshot APT (advanced persistent threat) is a malware package made up of smaller components that, once a system is infected, collects confidential data such as passwords, keystrokes, network traffic and other activity all while remaining completely undetected. It is not yet known what information and/or parties Slingshot was targeting, however, according to researchers, it’s primary purpose appears to be cyber-espionage. It is also believed that Slingshot could be a state-sponsored attack due to its complexity.

Slingshot employed extremely sophisticated tactics and techniques to gain kernel-level access to the infected systems. If a process can run at the kernel level, it has the capability to execute code and otherwise manipulate the host system at will as well as hide itself from intrusion detection systems on the host machine.

The attackers used a vulnerability in Mikrotik routers to load infected DLL files onto the device, which was then silently downloaded by Winbox, a configuration utility, when a user connects to the router. Winbox downloading DLL files from the router’s file system was part of the utility’s regular function until Mikrotik patched the software recently in response to the discovery of this vulnerability.

One of the DLLs downloaded by Winbox is a downloader for Slingshot’s primary payloads, and runs with the Winbox process, remaining undetected. For the malware to run in kernel mode and avoid detection, it loaded signed drivers and ran its own code through the driver’s vulnerabilities which would then download and execute its modules.

Most of the work is carried out by two modules. One, called GollumApp, includes most of the functions required for Slingshot to carry out its data collection and antidetection measures. The second, known as Canhadr, carries out routines for network and IO operations. It has full access to the hard drive and system memory all while remaining undetected by debugging and intrusion detection measures. Collected data is encrypted and transmitted through the network, though by hiding exfiltrated data in legitimate call-backs, appearing normal to

The complexity of Slingshot makes it very difficult for organisations to ensure that their data is completely secure, especially when zero-day exploits could be in use. Slingshot is largely believed to have been a targeted, state-sponsored attack, with many media outlets alleging US government involvement. Organisations and their security teams should continue to ensure that their security systems and policies and maintained and up to date with current threats and trends in information security. Many vulnerabilities that are exploited and used to gain access to confidential information are known and have been patched, however software and equipment have not been updated by administrators.

For assistance in protecting your organisation from malware  and other threats , please do not hesitate to contact Agilient.

The Agilient Team

 

Sources:

https://www.wired.com/story/router-hacking-slingshot-spy-operation-compromised-more-than-100-targets/

The Slingshot APT FAQ

https://www.kaspersky.com/blog/web-sas-2018-apt-announcement-2/21514/

https://arstechnica.com/information-technology/2018/03/potent-malware-that-hid-for-six-years-spread-through-routers/

https://www.scmagazine.com/slingshot-apt-campaign-exposed-after-six-years-of-sophisticated-spying/article/750416/

 

Tweet
Share

General

Looking for a security partner? Get in touch with Agilient.

Looking for practical and cost-effective security and risk solutions for your government department, agency or company? Speak with Australia’s leading senior security, risk and resilience experts.


Looking for a pandemic planning partner? Get in touch with Agilient.

Looking for practical and cost-effective risk management solutions for your government department, agency or company? Speak with Australia’s leading senior risk and emergency management experts.



Footer

Agilient is a proud member of

Ai Group Defence Council
Australian Industry & Defence Network
Australian Security Industry Association
Sydney Aerospace & Defence Interest Group

Company and Licensing Details:

ABN: 37 157 911 441
NSW Security Master Licence # 410783087
ACT Security Master Licence # 17502184
Vic Security Registration # 878-460-40S
Qld Security Firm Licence # 3834422

Join The Tribe

Sign up to receive our regular Agilient newsletter including the latest security, risk and resilience updates

Sign up now

Copyright © 2025 Agilient – Level 14, 275 Alfred St, North Sydney NSW 2060 Australia – 1300 341 692

Our Services

Security Consultant

Security Consultant Sydney

Security Consultant Melbourne

Security Consultant Canberra
Security Consultant Perth

Security Consultant Adelaide

Security Consultant Brisbane