Ramblings of an old Doc

 

The "Duqu" variant of the Stuxnet Trojan worm has been discovered, and its potential for attacking critical infrastructure computers around the world is worrisome.

The original Stuxnet managed to infiltrate computer systems in Iran and do damage to that nation's nuclear research program.

“On October 14, 2011, a research lab with strong international connections alerted us to a sample that appeared to be very similar to Stuxnet. They named the threat "Duqu" [dyü-kyü] because it creates files with the file name prefix “~DQ”. The research lab provided us with samples recovered from computer systems located in Europe, as well as a detailed report with their initial findings, including analysis comparing the threat to Stuxnet, which we were able to confirm. Parts of Duqu are nearly identical to Stuxnet, but with a completely different purpose.

Duqu is essentially the precursor to a future Stuxnet-like attack. The threat was written by the same authors (or those that have access to the Stuxnet source code) and appears to have been created since the last Stuxnet file was recovered. Duqu's purpose is to gather intelligence data and assets from entities, such as industrial control system manufacturers, in order to more easily conduct a future attack against another third party. The attackers are looking for information such as design documents that could help them mount a future attack on an industrial control facility… the threat was highly targeted toward a limited number of organizations for their specific assets. However, it’s possible that other attacks are being conducted against other organizations in a similar manner with currently undetected variants.” – Symantec Official Blog

At this point, Duqu only creates a back door into infected systems, connecting them to a command computer somewhere in India. Duqu is primarily a remote access Trojan (RAT). The threat does not self-replicate. Duku is designed to leave the back door open for precisely 36 days, and then self-destruct.

Mikko Hypponen, F-Secure's Chief Research Officer said, “Duku is so similar to Stuxnet that F-Secure's antivirus program initially identified it as Stuxnet.”

Symantec’s analysis shows the Duqu may have been used to surveil computers around the world as far back as December 2010. One of the variant’s driver files was signed with a valid digital certificate that expires August 2, 2012. The digital certificate belongs to a company headquartered in Taipei, Taiwan but was not necessarily stolen from that company. It might have been generated by the Duqu programmers.

"We wanted to put out the word so people know about the threat, and know what to watch out for, such as traffic to unknown servers or what files to look for so they can try to block them," he said. "In the coming days, we will look into information from other sources we have and see if we can get more information on what these guys are actually going for. The key thing missing here, unlike Stuxnet, is we don't know what they are looking for." – Symantec Official Blog

 

Source:

http://redtape.msnbc.msn.com/_news/2011/10/18/8384786-son-of-stuxnet-virus-could-be-used-to-attack-critical-computers-worldwide


Comments
on Oct 19, 2011

surprised that Stuxnet variants are not more prevalent ... or maybe they are

on Oct 19, 2011

India..?   I thought the US and Israel wanted to keep on to their creation until proven useless.

US base in India perhaps?

on Oct 19, 2011

It wasn't never more than speculation that the Stuxnet worm was created by the American and/or Israelis to begin with. It was based on the logic of motive or gain. In life, there are always more possibilities. Iran might have been an easy test from the security point of view and convenient in that others would think that it was targeted for the nuclear motive. Maybe it was. It's a complex question which neither of us will solve.

Campaigner
the US and Israel wanted to keep on to their creation until proven useless.

I don't understand... It certainly slowed Iran down and prevented bloodshed and death, so how would it be considered 'useless'?

on Oct 19, 2011

I saw this on Wired earlier and wouldn't be surprised is the Israelis had created it; we'll just never know for certain.

on Oct 19, 2011

I highly, highly doubt that this thing is being used by the US and/or Israel. It seems to have been used pretty indiscriminately, but more importantly it is not directed at any state entity hostile to the Washington bloc. I found it implausible enough that a cyberprogram as abysmal as that run by the US could cook up something as clever as Stuxnet... twice is kind of absurd. It's much more likely that the code got out somewhere (maybe the Iranians managed to isolate it?) and is now being used by other entities. China in particular has a history of this sort of very deniable, diffuse, non-destructive information-gathering espionage.

on Oct 21, 2011

The computer malware Stuxnet has been tough for many computer experts to determine. In  2010, it infected nuclear control systems in Iran. Industrial control computers in Europe  have been infected with a brand new malware. The Duqu virus doesn't appear to have direct  influence, but mines for information that could be used for further attacks. The big news is Duqu virus uses Stuxnet DNA to  mine industrial data .

on Oct 21, 2011

And here I thought we had a new Sith Lord running around.

 

Campaigner
India..?   I thought the US and Israel wanted to keep on to their creation until proven useless.

US base in India perhaps?

Nah - It is oursourcing.

on Oct 21, 2011

Dr Guy
Nah - It is oursourcing.
Pretty much. Convenient place to stick an information drop. Relatively advanced technological infrastructure, and with enough money a gaggle of foreigners won't get any questions about why they're there.

on Oct 22, 2011

DrJBHL

Quoting Campaigner, reply 2the US and Israel wanted to keep on to their creation until proven useless.

I don't understand... It certainly slowed Iran down and prevented bloodshed and death, so how would it be considered 'useless'?

 

I mean that the ones using the virus (and possibly created it) want to keep it until antiviruses can catch it.

 

Prevented blodshed and death..?   You mean the speculation of a nuclear strike against Israel ?

on Oct 22, 2011

Campaigner
Prevented blodshed and death..? You mean the speculation of a nuclear strike against Israel ?

Or the 'strike first' option ... against any of it's neighbors, plus the nuclear blackmail... you name it.

Antiviruses already catch it and the variant... at least the ones the labs use.

on Oct 22, 2011

Iran can't really do a first strike since Israel got planes with nukes in the air at all times.

Kinda doubt that Iran would just launch nukes against it's neighbors. Costs too much diplomatically plus the land gets contaminated.

 

Nuclear blackmail..?   Haven't heard that one. I know that Iran gives some uranium or something to somebody to make them into rods that can only be used in a reactor.

on Oct 22, 2011

I don't like nukes anywhere at all. But whenever one country in the Mideast (or in the larger world) has a disproportionate amount of power, the results usually aren't good. Mutually-assured-destruction may be horrifyingly scary, but it kept the Cold War from heating up for near on 50 years, and neither Israel of Iran has nearly the ability to use proxy countries the way the US and Soviets did.