Software:Duqu 2.0
Duqu 2.0 is a version of malware reported in 2015 to have infected computers in hotels of Austria and Switzerland that were sites of the international negotiations with Iran over its nuclear program and economic sanctions.[1] The malware, which infected Kaspersky Lab for months without their knowledge,[2] is believed to be the work of Unit 8200, an Israeli Intelligence Corps unit of the Israel Defense Forces. The New York Times alleges this breach of Kaspersky in 2014 is what allowed Israel to notify the US of Russian hackers using Kaspersky software to retrieve sensitive data.[3]
Kaspersky discovered the malware, and Symantec confirmed those findings. The malware is a variant of Duqu, and Duqu is a variant of Stuxnet. The software is "linked to Israel", according to The Guardian .[4] The software used three zero-day exploits,[5] and would have required funding and organization consistent with a government intelligence agency.[6]
According to Kaspersky, "the philosophy and way of thinking of the “Duqu 2.0” group is a generation ahead of anything seen in the advanced persistent threats world."[7]
See also
- Negotiations on Iran nuclear deal framework
- Unit 8200
References
- ↑ "Iran nuclear talks: Israel denies bugging venues". BBC News. 11 June 2015. https://www.bbc.com/news/world-middle-east-33090381.
- ↑ Hackers PWNED Kaspersky Lab servers for months -- Duqu 2.0 blamed on Israel By Richi Jennings, Computerworld | JUN 11, 2015
- ↑ Perlroth, Nicole; Shane, Scott (2017-10-10). "How Israel Caught Russian Hackers Scouring the World for U.S. Secrets" (in en-US). The New York Times. ISSN 0362-4331. https://www.nytimes.com/2017/10/10/technology/kaspersky-lab-israel-russia-hacking.html.
- ↑ Gibbs, Samuel (11 June 2015). "Duqu 2.0: computer virus 'linked to Israel' found at Iran nuclear talks venue". https://www.theguardian.com/technology/2015/jun/11/duqu-20-computer-virus-with-traces-of-israeli-code-was-used-to-hack-iran-talks.
- ↑ Maynard, Peter; McLaughlin, Kieran; Sezer, Sakir (February 2016). "Modelling Duqu 2.0 Malware using Attack Trees with Sequential Conjunction.". ICISSP: 465–472. doi:10.5220/0005745704650472. ISBN 978-989-758-167-0. http://www.scitepress.org/DigitalLibrary/Link.aspx?doi=10.5220/0005745704650472. Retrieved 24 July 2017.
- ↑ Leyden, John. "Duqu 2.0 malware buried into Windows PCs using 'stolen Foxconn certs'". https://www.theregister.co.uk/2015/06/15/duqu2_stolen_foxconn_cert/.
- ↑ The Duqu 2.0 Targeted Attacks
Template:Computer-security-stub
Original source: https://en.wikipedia.org/wiki/Duqu 2.0.
Read more |