Next gen Stuxnet - Duqu 2.0?

Last week the discovery of the new and revised Duqu has stirred interest around the similarities between this new malware and it's similarities to Stuxnet.

A bit of history about both Duqu and Stuxnet;

Stuxnet
Stuxnet made its glory by attacking the Iran nuclear facilities in 2012. This worm was designed to attack the industrial programmable logic controllers (PLC) in a nuclear system. Turns out it worked great, and put several Iranian centrifuges out of commission.  Shortly after, the underlying vulnerabilities MS15-020 that Stuxnet exploited was discovered and used en mass by the underground community. However the actual code behind Stuxnet remained a mystery.

Duqu
Duqu has been making it's rounds for a while, primarily used to collect key strokes and general exfiltration of systems. This Trojan made it's fame with the kernel exploit in MS11-087 . And has been used by the bad guys to spy on users and even remote format hard drivers.

Duqu 2.0

Now thanks to the capture of this new piece of malware by Kaspersky a profound similarity between Stuxnet and Duqu has been discovered. When looking at the two you can see a pattern or similarity in a binary image.  As the techworld article points out that Kaspersky discovered the development language used in both is a modified version of C. 



The fact that there is a professional organization out in the wild that has this source code and is actively revising and improving on it makes for interesting hypothesis.

 Is this a continued effort by either the US or Israeli government in a cyberwar that is waging, with no one being aware of? Has this code made it to the underground where it's now being revised weaponized and used by the criminals?

Or are we dealing with a leak in either government, and maybe a mole playing with the code?
 I know these theories may sound a bit obscure, but you have to ask, why and how did a block code, that was never released in the wild come back packaged in the Duqu 2.0 Trojan? 

Comments

Popular posts from this blog

Protecting sensitive data

Secure workstation - Root of trust to manage the cloud

Why is privileged access important?