AIRLINK 74.00 Decreased By ▼ -0.25 (-0.34%)
BOP 5.14 Increased By ▲ 0.09 (1.78%)
CNERGY 4.55 Increased By ▲ 0.13 (2.94%)
DFML 37.15 Increased By ▲ 1.31 (3.66%)
DGKC 89.90 Increased By ▲ 1.90 (2.16%)
FCCL 22.40 Increased By ▲ 0.20 (0.9%)
FFBL 33.03 Increased By ▲ 0.31 (0.95%)
FFL 9.75 Decreased By ▼ -0.04 (-0.41%)
GGL 10.75 Decreased By ▼ -0.05 (-0.46%)
HBL 115.50 Decreased By ▼ -0.40 (-0.35%)
HUBC 137.10 Increased By ▲ 1.26 (0.93%)
HUMNL 9.95 Increased By ▲ 0.11 (1.12%)
KEL 4.60 Decreased By ▼ -0.01 (-0.22%)
KOSM 4.83 Increased By ▲ 0.17 (3.65%)
MLCF 39.75 Decreased By ▼ -0.13 (-0.33%)
OGDC 138.20 Increased By ▲ 0.30 (0.22%)
PAEL 27.00 Increased By ▲ 0.57 (2.16%)
PIAA 24.24 Decreased By ▼ -2.04 (-7.76%)
PIBTL 6.74 Decreased By ▼ -0.02 (-0.3%)
PPL 123.62 Increased By ▲ 0.72 (0.59%)
PRL 27.40 Increased By ▲ 0.71 (2.66%)
PTC 13.90 Decreased By ▼ -0.10 (-0.71%)
SEARL 61.75 Increased By ▲ 3.05 (5.2%)
SNGP 70.15 Decreased By ▼ -0.25 (-0.36%)
SSGC 10.52 Increased By ▲ 0.16 (1.54%)
TELE 8.57 Increased By ▲ 0.01 (0.12%)
TPLP 11.10 Decreased By ▼ -0.28 (-2.46%)
TRG 64.02 Decreased By ▼ -0.21 (-0.33%)
UNITY 26.76 Increased By ▲ 0.71 (2.73%)
WTL 1.38 No Change ▼ 0.00 (0%)
BR100 7,874 Increased By 36.2 (0.46%)
BR30 25,599 Increased By 139.8 (0.55%)
KSE100 75,342 Increased By 411.7 (0.55%)
KSE30 24,214 Increased By 68.6 (0.28%)

dugu-virusSAN FRANCISCO: Internet security specialists have warned of a new round of cyber warfare in the form of a computer virus similar to the malicious Stuxnet worm believed to have targeted Iran's nuclear program.

Analysts at US firms McAfee and Symantec agreed that a sophisticated virus dubbed "Duqu" has been unleashed on an apparent mission to gather intelligence for future attacks on industrial control systems.

"This seems to be the reconnaissance phase of something much larger," McAfee senior research analyst Adam Wosotowsky told AFP about the virus, named for the "DQ" prefix on files it creates.

McAfee and Symantec said that, based on snippets of the virus they were given to study, portions of the encrypted Duqu code matched identically scrambled portions of Stuxnet.

"The threat was written by the same authors (or those that have access to the Stuxnet source code) and appears to have been created since the last Stuxnet file was recovered," Symantec said on its website.

"Duqu's purpose is to gather intelligence data and assets from entities, such as industrial control system manufacturers, in order to more easily conduct a future attack against another third party.

"The attackers are looking for information such as design documents that could help them mount a future attack on an industrial control facility."

Symantec said the virus had been aimed at "a limited number of organizations for their specific assets," without providing further information.

McAfee was working to trace a timeline of Duqu's spread and the areas it has reached.

"It seems to be primarily centred on the Middle East, then India, Africa and Eastern Europe," Wosotowsky said. "I haven't seen any reports in North or South America."

Duqu was crafted to steal information by logging computer key strokes or mining machines for valuable data such as passwords or credentials that could be used to slip into networks undetected, according to McAfee.

Duqu is able to pass information to its creators through "command and control" computers that could then be used to issue new orders, such as seizing control of factory machinery.

"Our guess is that it is going after infiltrating certificate authorities to then use those to sign programs and install itself much more cleanly on more protected, locked-down networks," Wosotowsky said.

Symantec said it was alerted to the threat on October 14 by a "research lab with strong international connections."

McAfee, like Symantec, declined to identify the research facility that tipped it off.

Wosotowsky saw Duqu as evidence that nation states are taking their conflicts into the cyber world.

"Normal people shouldn't be highly concerned with getting an infection in their personal, independent systems," Wosotowsky said.

"But they should be concerned that we are going to see the militarization of cyber space going forward... This is a new face of international conflict."

Stuxnet was designed to attack computer control systems made by German industrial giant Siemens and commonly used to manage water supplies, oil rigs, power plants and other critical infrastructure.

Most Stuxnet infections have been discovered in Iran, giving rise to speculation it was intended to sabotage nuclear facilities there. The worm was crafted to recognize the system it was to attack.

The New York Times reported in January that US and Israeli intelligence services collaborated to develop the computer worm to sabotage Iran's efforts to make a nuclear bomb.

Tehran has always denied it is seeking nuclear weapons.

Copyright AFP (Agence France-Presse), 2011

Comments

Comments are closed.