Next gen Stuxnet - Duqu 2.0?
Last week the
discovery of the new and revised Duqu has stirred interest around the
similarities between this new malware and it's similarities to Stuxnet.
A bit of history
about both Duqu and Stuxnet;
Stuxnet
Stuxnet made its
glory by attacking the Iran nuclear facilities in 2012. This worm was designed to attack
the industrial programmable logic controllers (PLC) in a nuclear system. Turns
out it worked great, and put several Iranian centrifuges out of
commission. Shortly after, the
underlying vulnerabilities MS15-020
that Stuxnet exploited was discovered and used en mass by the underground
community. However the actual code behind Stuxnet remained a mystery.
Duqu
Duqu has been making
it's rounds for a while, primarily used to collect key strokes and general
exfiltration of systems. This Trojan made it's fame with the kernel exploit in MS11-087 .
And has been used by the bad guys to spy on users and even remote format hard
drivers.
Duqu 2.0
Now thanks to the
capture of this new piece of malware by Kaspersky a profound similarity between
Stuxnet and Duqu has been discovered. When looking at the two you can see a
pattern or similarity in a binary image.
As the techworld
article points out that Kaspersky discovered the development language used in
both is a modified version of C.
The fact that there
is a professional organization out in the wild that has this source code and is
actively revising and improving on it makes for interesting hypothesis.
Is this a continued effort by either the US or
Israeli government in a cyberwar that is waging, with no one being aware of?
Has this code made it to the underground where it's now being revised
weaponized and used by the criminals?
Or are we dealing
with a leak in either government, and maybe a mole playing with the code?
I know these theories may sound a bit obscure,
but you have to ask, why and how did a block code, that was never released in
the wild come back packaged in the Duqu 2.0 Trojan?
Comments
Post a Comment