CrySyS tool IDs new Duqu variant

Powered by SC Magazine
 

'Son-of-Stuxnet' ducks, fails, anti-virus check.

CrySyS Lab has updated its Duqu malware detection tool to identify a new variant of the Stuxnet-like trojan, detected this week.

The Duqu malware was sophisticated and dangerous, but not prolific. It had created backdoors in a limited number of industrial systems in Iran, India and some European countries.

But on Tuesday, Symantec researchers said they received a variant of the Windows-based malware that had been tweaked to avoid anti-virus detection.

Researchers passed on the Duqu loader file to the Budapest-based CrySyS (Laboratory of Cryptography and System Security) Lab. It used the file to update its free Duqu detection tool

The loader file was used to execute the encrypted Duqu malware once an infected machine restarted. 

Credit: Symantec
  

Symantec researchers said the Duqu variant was compiled on 23 February and was tweaked "just enough" to evade anti-virus checks, though the effort was only "partially successful".

The driver file, previously signed with a stolen certificate, was now made to resemble a Microsoft driver they said.

Last week, continued research by Kaspersky and the information security community identified a component of Duqu that was written in a previously alien code.

Input from the community led researchers to confirm the Duqu Framework was compiled with a slightly modified creation of customer object-oriented extension to C.

Work on identifying the creators of Duqu and its command and control servers continues.

Copyright © SC Magazine, Australia


CrySyS tool IDs new Duqu variant
 
 
 
Top Stories
Meet FABACUS, Westpac's first computer
GE225 operators celebrate gold anniversary.
 
NSW Govt gets ready to throw out the floppy disks
[Opinion] Dominic Perrottet says its time for government to catch up.
 
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  26%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 337

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  58%
 
No
  42%
TOTAL VOTES: 142

Vote