The Duqu computer infection was spread with the help of an infected Microsoft Word document, according to a report.The research says the Trojan exploited a previously unknown vulnerability embedded in Word files, allowing Duqu to modify computers' security protection.The code is believed to have been designed to gather intelligence from industrial control-systems.Microsoft says it is preparing a software patch to address the issue.The Laboratory of Cryptography and Systems Security (Crysys) at Budapest University made the discovery."We carefully analysed the available forensics data from the original incident where Duqu was uncovered," Dr Boldizsar Bencsath, who led the investigation, told the BBC."We found suspicious files that we further analysed, and in one case, we were able to prove that the file contains the installer of Duqu and it uses a zero-day exploit."A zero-day exploit is a computer threat that make use of a previously unknown software err.or to allow the attacker to gain permissions they should not haveDr Bencsath added that it is possible that Duqu may also be installed by other means, but he had not found any evidence to suggest it.The news is being publicised by the internet security firm Symantec.It says that it has confirmed the Duqu infection at six different computer networks belonging to unidentified organisations across a total of eight countries. They include Iran, India, France and Ukraine.In addition other security firms have reported suspected infections in a further four countries, including the UK.Duqu has been compared to last year's Stuxnet worm attack, but Symantec says they operate in two distinct ways."Stuxnet was about spreading as far and as wide as possible to hunt down systems that could pass on control of industrial organisations - such as nuclear power plants," said Greg Day, Symantec's director of security strategy."Duqu has specifically targeted a number of organisations looking to scan across their internal systems, gather intelligence and pass it back out."The sort of things it's collecting are design documents and other information that could be the reconnaissance for a further attack."So far neither Symantec nor Crysys have been able to trace who is receiving the data. Efforts to address the exploit are ongoing."Microsoft is working with our partners to provide protections for a vulnerability used in targeted attempts to infect computers with the Duqu malware," a company statement said.We will be providing a security update for customers through our update process."Experts say these types of focused attacks appear to be on the rise.Earlier this week Symantec reported that 29 chemicals firms had been targeted by a separate Trojan named PoisonIvy."Industrial espionage is the natural evolution from cybercrime," said Mr Day."Cybercrime is like pick pocketing. But these latest threats are like great train robberies, where the attackers have taken time to understand the intended victim and have a carefully constructed plan to rob them."
GMT 16:03 2018 Wednesday ,28 November
Executive Office of Arab Ministers of Communications starts in CairoGMT 09:12 2018 Thursday ,15 November
Syria, Iran discuss enhancing scientific cooperationGMT 17:45 2018 Wednesday ,31 October
Next expedition may go to ISS on 3 DecemberGMT 13:56 2018 Saturday ,27 October
Head of Soviet space shuttle program dies aged 89GMT 15:58 2018 Monday ,15 October
Crew scheduled to go to ISS to remain unchangedGMT 10:57 2018 Saturday ,13 October
Expert says crewless ISS poses risk of station’s lossGMT 18:49 2018 Thursday ,11 October
Soyuz-FG suffers setback in 165th second of flightGMT 17:53 2018 Sunday ,07 October
Science, technologies to be bridge between Russian and JapanMaintained and developed by Arabs Today Group SAL.
All rights reserved to Arab Today Media Group 2021 ©
Maintained and developed by Arabs Today Group SAL.
All rights reserved to Arab Today Media Group 2021 ©
Send your comments
Your comment as a visitor