Duqu, Son of Stuxnet

An apparently modified version of the well-publicised Stuxnet worm has been discovered on a number of corporate computer systems in Europe. Analysis suggests that the malware, named Duqu (pronounced d...
Blog rating:1 out of5 with1 ratings

Duqu, Son of Stuxnet

by Andy on October 20th, 2011 in Security Alert.

An apparently modified version of the well-publicised Stuxnet worm has been discovered on a number of corporate computer systems in Europe. Analysis suggests that the malware, named Duqu (pronounced dyü-kyü), appears to be based on the Stuxnet source code, giving rise to the possibility  that Duqu may have been developed either by the Stuxnet authors or by developers who have had access to the source code.

Stuxnet, which was designed to target industrial control systems developed by Siemens, made headlines when it was discovered in in Iran. The type of control systems that were targeted generated speculation that US and Israeli intelligence services worked together in an attempt to target Iran's nuclear program.

Despite sharing similarities in terms of code, structure and other technical elements, Stuxnet and Duqu have different objectives. Rather than being used for potentially destructive purposes, Duqu is used as a backdoor to allow attackers to remotely access compromised systems as a means to siphon off sensitive information and gather intelligence, potentially for use in future attacks. 

When installed, Duqu disguises itself as a device driver that loads when the system boots whereupon further components are injected into running programs. Once established on the target system, Duqu communicates with a command and control server allowing further information harvesting programs to be installed. Harvested information is then recorded in encrypted logs for the attackers to smuggle out, back to to the command and control server. In a twist, Duqu will run on the infected system for 36 days before deleting itself, possibly in an effort to remain under the radar.

While Duqu is an example of a significantly more evolved threat, given the similarities between it and Stuxnet in that it is a low prevalence, highly targeted threat against specific organisations, it is unlikely that home users will find themselves victim to this malware. It's discovery is likely to be of  particular concern to corporations and other organisations who seek to protect against sensitive and valuable data leaks.

Average: 1 (1 vote)

Facebook Comments Box

x

Our best antivirus yet!

Fresh new look. Faster scanning. Better protection.

Enjoy unique new features, lightning fast scans and a simple yet beautiful new look in our best antivirus yet!

For a quicker, lighter and more secure experience, download the all new adaware antivirus 12 now!

Download adaware antivirus 12
No thanks, continue to lavasoft.com
close x

Discover the new adaware antivirus 12

Our best antivirus yet

Download Now