![](http://2.bp.blogspot.com/-7Y-TRNMi_B0/TsFWf-A3TvI/AAAAAAAAAwg/peznsVU-DvU/s320/matrixsentinel.jpg.png)
In a Friday blog post, Kaspersky Labs said that recent evidence suggests work on Duqu could date as far back as 2007, and that attackers are creating custom files for each individual attack. In the cases analyzed by researchers at Kaspersky Lab, the email contains a Word file that includes the exploit code,"--Kaspersky's Dennis Fisher wrote. The Windows-specific computer threat, however, appeared to target Iranian nuclear facilities and infected tens of thousands IP addresses in the country. Security organisations had previously identified Iran as one of at least eight countries targeted by the code. Third attack?
Last year the Iranian government accused the West of trying to disrupt its nuclear facilities using the Stuxnet worm computer attack. Officials now describe the Duqu attack as the "third virus" to hit Iran. Keylogging programs are able to collect information about a computer system, take screenshots, search for files and capture passwords. The firm also provided more detail about how Duqu worked based on its analysis of other targets. Kaspersky Lab said the font was called Dexter Regular and its creators were identified as Showtime Inc.
The firm said the exploit then loaded a driver onto the system. Iran has confirmed that a number of computer networks in the country have been infected by the Duqu trojan, an enigmatic piece of malware based on Stuxnet. "The software to control the (Duqu) virus has been developed and made available to organizations and corporations in Iran," Brigadier General Gholamreza Jalali told the government-controlled IRNA news agency. The cyber defense unit works day and night to combat cyber attacks and spy (computer) virus."--Although Duqu is similar to Stuxnet, the latest malware variant is coded to collect intelligence data that could be used to launch attacks against industrial and nuclear control systems.
Post a Comment