iTnews

Duqu spoke in alien tongue

By SC Staff on Mar 9, 2012 9:45AM
Duqu spoke in alien tongue

Part of the Duqu Trojan was written in an unknown programming language.

Part of the Duqu Trojan was written in an unknown programming language, according to research by Kaspersky Lab.

The method in which Duqu communicated with its command and control (C&C) servers after infection.

Researchers said the Duqu module interacted with the C&C servers through the Payload dll. Further analysis found a specific section was written in an unknown language.

Kaspersky researchers named this unknown section the Duqu Framework.

They said it demonstrated the Duqu developer's high level of skill and the significant financial investment.

The remainder of Duqu was written in C++ and was compiled with Microsoft's Visual C++ 2008.

Researchers confirmed the language was object-oriented and performed its own set of related activities suitable for network applications.

Chief security expert Alexander Gostev said it was possible an entirely different team was responsible for creating the Duqu Framework.

“With the extremely high level of customisation and exclusivity that the programming language was created with, it is also possible that it was made not only to prevent external parties from understanding the cyber-espionage operation and the interactions with the C&Cs, but also to keep it separate from other internal Duqu teams who were responsible for writing the additional parts of the malicious program.”

Kaspersky Lab has appealed to the programming community and asks anyone who recognises the framework, toolkit or the programming language and can generate similar code constructions to contact its researchers.

This article originally appeared at scmagazineuk.com

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, UK edition
Tags:
duqu kaspersky programming security

Partner Content

Resetting cyber security for the new threat landscape
Partner Content Resetting cyber security for the new threat landscape
Tackling cybersecurity in 2021
Partner Content Tackling cybersecurity in 2021
What conversations should executives be having about cyber security?
Partner Content What conversations should executives be having about cyber security?
Shut the door on ransomware
Promoted Content Shut the door on ransomware

Sponsored Whitepapers

The top 5 tech trends to deliver business outcomes
The top 5 tech trends to deliver business outcomes
10 reasons why businesses need to invest in cloud security training
10 reasons why businesses need to invest in cloud security training
Your guide to application security solutions
Your guide to application security solutions
State of Software Security: Open Source Edition
State of Software Security: Open Source Edition
Five questions to ask before you upgrade to a SIEM solution
Five questions to ask before you upgrade to a SIEM solution

Events

  • On-Demand Webinar: How Poly and Microsoft are Embracing Future Work Environments
  • [iTnews and Micro Focus] Navigating the cloud modernisation minefield
By SC Staff
Mar 9 2012
9:45AM
0 Comments

Related Articles

  • US senator claims Microsoft failed to fix cloud holes before SolarWinds hack
  • 86 400 looks to strengthen customer sign-up process
  • Britain's GCHQ cyber spies embrace the AI revolution
  • Critical remote code execution bug found in VMware vCenter
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

TPG Telecom to start enticing NBN customers to move

TPG Telecom to start enticing NBN customers to move

Infosys scores another $40m for Centrelink payments engine build

Infosys scores another $40m for Centrelink payments engine build

Telstra InfraCo opens up telco's own fibre network

Telstra InfraCo opens up telco's own fibre network

Transport for NSW data stolen in Accellion breach

Transport for NSW data stolen in Accellion breach

You must be a registered member of iTnews to post a comment.
Log In | Register
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.