After successfully exploiting the NASDAQ server, hackers have used a malware into the attack, which have the capability to extract data from the systems and carry out surveillance as well. However researcher says that the malware was designed to infect the wide spread system of the NASDAQ.
The report of the compromise was already given to NASDAQ, but had neglected the issue. After that National Security Agecy (NSA) were called to investigate the hack incident. After the five months of investigation by FBI , NSA and CIA, it was uncovered that the malware used two unnamed Zero-day security flaws, for which there were no patches existed.
NSA point out that the code of the malware was similar to the malware previously used by the Russia’s espionage agency Russian Federal Security Service. It appears that the ability of the malware is simple spying on the financial activity of the NASDAQ.
Bloomberg reports that one of the forensic investigators referred to the Nasdaq’s systems as “the dirty swamp,” because very few records were available that would have revealed daily activities on the servers and would have helped retrace the steps of the intruders.
Nasdaq spokesperson says that the malware did not reach the stock exchange, as originally stated in the cover story headline. "The events of four years ago, while sensationalized by Businessweek, only confirmed what we have said historically: that none of Nasdaq's trading platforms or engines were ever compromised, and no evidence of exfiltration exists from directors' desks," said NASDAQ spokesman Ryan Wells.
The investors also reveals that attacker have not attacked into the other financial business system, as attacker can easily expand its attack with exploiting same vulnerability on other business system too.