The Duqu computer infection was spread with the help of an infected Microsoft Word document, according to a report.The research says the Trojan exploited a previously unknown vulnerability embedded in Word files, allowing Duqu to modify computers\' security protection.The code is believed to have been designed to gather intelligence from industrial control-systems.Microsoft says it is preparing a software patch to address the issue.The Laboratory of Cryptography and Systems Security (Crysys) at Budapest University made the discovery.\"We carefully analysed the available forensics data from the original incident where Duqu was uncovered,\" Dr Boldizsar Bencsath, who led the investigation, told the BBC.\"We found suspicious files that we further analysed, and in one case, we were able to prove that the file contains the installer of Duqu and it uses a zero-day exploit.\"A zero-day exploit is a computer threat that make use of a previously unknown software err.or to allow the attacker to gain permissions they should not haveDr Bencsath added that it is possible that Duqu may also be installed by other means, but he had not found any evidence to suggest it.The news is being publicised by the internet security firm Symantec.It says that it has confirmed the Duqu infection at six different computer networks belonging to unidentified organisations across a total of eight countries. They include Iran, India, France and Ukraine.In addition other security firms have reported suspected infections in a further four countries, including the UK.Duqu has been compared to last year\'s Stuxnet worm attack, but Symantec says they operate in two distinct ways.\"Stuxnet was about spreading as far and as wide as possible to hunt down systems that could pass on control of industrial organisations - such as nuclear power plants,\" said Greg Day, Symantec\'s director of security strategy.\"Duqu has specifically targeted a number of organisations looking to scan across their internal systems, gather intelligence and pass it back out.\"The sort of things it\'s collecting are design documents and other information that could be the reconnaissance for a further attack.\"So far neither Symantec nor Crysys have been able to trace who is receiving the data. Efforts to address the exploit are ongoing.\"Microsoft is working with our partners to provide protections for a vulnerability used in targeted attempts to infect computers with the Duqu malware,\" a company statement said.We will be providing a security update for customers through our update process.\"Experts say these types of focused attacks appear to be on the rise.Earlier this week Symantec reported that 29 chemicals firms had been targeted by a separate Trojan named PoisonIvy.\"Industrial espionage is the natural evolution from cybercrime,\" said Mr Day.\"Cybercrime is like pick pocketing. But these latest threats are like great train robberies, where the attackers have taken time to understand the intended victim and have a carefully constructed plan to rob them.\"
GMT 20:46 2018 Tuesday ,23 January
New app to help Indians apply for UAE jobs visaGMT 21:37 2018 Sunday ,14 January
Champagne box-sized satellite launchedGMT 21:32 2018 Sunday ,14 January
Man's best friend goes high techGMT 16:11 2018 Friday ,12 January
UAE Research Programme for Rain Enhancement Science leads the way to new scientific and technological horizonsGMT 09:35 2018 Tuesday ,09 January
SpaceX launches secretive Zuma missionGMT 21:38 2018 Friday ,05 January
Our reliance on technology is having an effect on us allGMT 07:47 2017 Sunday ,24 December
China jails VPN owner for over five yearsGMT 20:59 2017 Saturday ,25 November
Now make unlimited voice, video calls in UAE for Dh50Maintained and developed by Arabs Today Group SAL.
All rights reserved to Arab Today Media Group 2021 ©
Maintained and developed by Arabs Today Group SAL.
All rights reserved to Arab Today Media Group 2021 ©
Send your comments
Your comment as a visitor