"In the framework of active counter-intelligence measures, we detected spyware produced in a foreign country and operating and spreading in computers in Lithuania. Thorough tests showed that the spyware had infected computers of state institutions, private companies and individuals," the Second Investigation Department under the Ministry of National Defense said in an overview of threats published on Friday.
According to the report, the spyware was intended to collect data stored on the computer, remote administration, network monitoring and identification of accounts and passwords. Furthermore, it could activate video or audio devices for real-time surveillance.
The spyware is in most cases distributed via external USB media, optical (CD and DVD) and hard (HDD) discs or as e-mail attachments.
"Yet another function of the spyware has been detected – creation of the BotNet computer network. The malware allows remote operation of the computer, therefore, any computer infected with the spyware becomes part of the BotNet network," the department said in its document.
Furthermore, the spyware can infect computers with no Internet access, closed computers or computer networks.
Ordinary anti-virus software do not detect the spyware, which can only be identified by certain features of an infected computer, the intelligence service said.
According to the documents, one of the best ways of destroying malware is reinstalling the computer.
"However, due to lack of user education on security of information technologies and communications, technical solutions (reinstallation, etc.) can be insufficient protection against spying and other malware," reads the document.
Nevertheless, the report did not reveal the state institutions, companies and people who had their computers infected with the spyware or the damage caused.