Blog Posts Tagged with "DUQU"

68b48711426f3b082ab24e5746a66b36

Stuxnet: The New Face of 21st Century Cyber Warfare

August 23, 2012 Added by:Fergal Glynn

In June of 2010 the Stuxnet worm made it’s debut. Joint engineered by the United States and Israel to cripple Iran’s nuclear efforts, it wasn’t long before the worm was altered and turned loose on the internet spawning a number of variations of the original worm and affecting computers around the world...

Comments  (1)

0ff0a77035f9569943049ed3e980bb0d

Giving Aid and Comfort to the Enemy

August 16, 2012 Added by:

Why do the likes of McAfee, Symantec, TrendMicro, Microsoft and Bitdefender publish reverse engineering code examples and analysis on cyber espionage and sabotage tools which serve to delay, disrupt, deny, and deceive our enemies from developing nuclear weapons. This is giving aid and comfort to the enemy...

Comments  (11)

7fef78c47060974e0b8392e305f0daf0

ICS-CERT: Gauss Information Stealing Malware

August 14, 2012 Added by:Infosec Island Admin

Kaspersky Lab recently released a report on a new information-stealing malware they have named “Gauss" which is designed to collect information and send the data to its command-and-control servers. Gauss was predominantly on systems in the Middle East, but has also been detected on networks in the US...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Gauss: Evidence of Ongoing Cyberwar and Espionage Campaigns

August 13, 2012 Added by:Pierluigi Paganini

Gauss collects network interface information, BIOS characteristics and computer drive details. Many ignore the aspect of modularity of the agent which may receive supplementary modules developed using the info acquired directly on the targets to conduct attacks against critical infrastructure...

Comments  (0)

Aadb52f9100e0d31264fb3ce9e3d2536

Stuxnet and Cyber Deterrence

August 13, 2012 Added by:Robert M. Lee

Stuxnet showed that a nation-state was capable and willing to use an advanced cyber weapon against an adversary. With the world believing that the United States is responsible, the nation now has the highest level of credibility for willingness and capability to develop and use a cyber weapon. That is a strong deterrent...

Comments  (23)

7fef78c47060974e0b8392e305f0daf0

Malware Wars! Cyber-Wars! Cyber-Espionage-Wars! Oh My...

August 11, 2012 Added by:Infosec Island Admin

We have opened Pandora’s box and there is no way to get what has escaped back in. We have given the weapon framework away due to the nature of the carrier. Even if Gauss is encrypted, it will be broken and then what? Unlike traditional weapons that destroy themselves, the malware we have sent can be reverse engineered...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Stuxnet, Flame, Duqu Less Dangerous than Conventional Attacks

June 21, 2012 Added by:Headlines

“Our advice to ICS and SCADA network managers is to be informed of new threats like Flame, but be especially vigilant against the more conventional, widely understood threats. In all likelihood, a simple denial-of-service attack has a better chance of wreaking havoc on their network than Stuxnet or Duqu"...

Comments  (0)

924ce315203c17e05d9e04b59648a942

Flame's MD5 Collision: Most Worrisome Security Discovery of 2012

June 15, 2012 Added by:Richard Stiennon

Stuxnet, Duqu and Flame have used false certificates to infiltrate a network. Action must be taken today to discover and root out MD5 certificates from the enterprise. We are beyond the proof of concept stage. Certificate attacks will be with us as long as MD5 based certificates are used to authenticate critical systems....

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Researchers: Flame Malware Shares Stuxnet Virus Module

June 11, 2012 Added by:Headlines

"Despite the fact that Stuxnet has been the subject of in-depth analysis... the mysterious 'resource 207' from 2009 has gone largely unnoticed. But it turns out that this is the missing link between Flame and Stuxnet... Clearly, these two pieces of exploit code were written by the same programmer..."

Comments  (0)

8a958994958cdf24f0dc051edfe29462

Flame Virus: A Controlled Burn?

June 02, 2012 Added by:Larry Karisny

What Flame is doing in the Middle East attacks can be done in other countries, even the ones releasing the attack. The technical nature of computer virus propagation could leak the virus to unintended areas, as happened with Stuxnet. Playing with these vulnerabilities is like playing with fire...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Cyberwar Threats and Critical Infrastructure Vulnerabilities

May 31, 2012 Added by:Headlines

"Targeted attacks are increasing dramatically. It could be state sponsored or it could be just hacktivists or it could be a cyber criminal organisation. But we know the number one target is government institutions and the second is manufacturing, including oil and gas..."

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Flame Malware: From Genesis to the Conspiracy Theory

May 31, 2012 Added by:Pierluigi Paganini

Some antivirus providers were ready with a fix for Flame. This information, together with evidence that the malware dates to at least 2010, would lead me to believe that the major security companies were aware of Flame and have been silent because of agreements with Western governments...

Comments  (2)

Aadb52f9100e0d31264fb3ce9e3d2536

Flame: Implications vs. Speculation

May 30, 2012 Added by:Robert M. Lee

Attribution is incredibly hard to apply in the cyber domain, and even the most appealing pieces of evidence can be purposely misleading. The perception of attribution applied to a nation-state cyber attack can put tension on nation-state relationships, have an effect on deterrence, and cause real-world issues...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Symantec Flame Analysis: A Sophisticated and Discreet Threat

May 30, 2012 Added by:Headlines

"The modular nature of this malware suggests that a group of developers have created it with the goal of maintaining the project over a long period of time; very likely along with a different set of individuals using the malware. The architecture... allows the authors to change functionality and behavior"...

Comments  (0)

296634767383f056e82787fcb3b94864

Kaspersky's Problematic Flame Analysis

May 29, 2012 Added by:Jeffrey Carr

I'm beginning to wonder what's going on over at Kaspersky Labs. Kaspersky Labs has called a virus whose only purpose is to steal data a "cyber weapon". Come on, guys. Espionage is not warfare and never has been. Hence a tool created solely to conduct cyber espionage cannot also be legitimately called a cyber weapon...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Flame Trojan Ignites Cyberwar Chatter

May 29, 2012 Added by:Headlines

"Flame shares many characteristics with notorious cyber weapons Duqu and Stuxnet: while its features are different, the geography and careful targeting of attacks coupled with the usage of specific software vulnerabilities seems to put it alongside those familiar super-weapons currently deployed in the Middle East.."

Comments  (0)

Page « < 1 - 2 - 3 > »