Stuxnet variant, Duqu, found foraging in the wild

A targeted Trojan bearing a lot of similarities to the Stuxnet virus has been found in industrial systems in Europe, apparently being used to gather information for a future Stuxnet-style attack, security company Symantec reports.

The remote-access Trojan, dubbed “Duqu” because it creates files with the prefix “~DQ," was written either by the same people who wrote Stuxnet or by people with access to Stuxnet’s code, according to a posting on Symnantec’s official blog.

“Parts of Duqu are nearly identical to Stuxnet, but with a completely different purpose,” according to the blog, which described Duqu as a precursor to an attack. “Duqu's purpose is to gather intelligence data and assets from entities, such as industrial control system manufacturers, in order to more easily conduct a future attack against another third party,” Symantec states.
 
Duqu, which is also being referred to around the Internet as "son of Stuxnet," doesn’t self-replicate and appears to have been “highly targeted toward a limited number of organizations,” Symantec said, while noting that it could have attacked other systems without being detected. The remote-access Trojan, or RAT, communicates via the Web with a command and control server, which allowed it to download an “infostealer” capable of enumerating the network, recording keystrokes and gathering system information, Symantec said.

Symantec’s examination of Duqu variants showed that they may have  been around since December 2010. And one of the variants was signed with a digital certificate that was to expire Aug. 2, 2012.

The digital certificate masks Duqu as legitimate code. The certificate is registered to a company in Taipei, Taiwan, Kim Zetter reports at Wired. Although Symantec didn’t name the company, F-Secure identified it as C-Media Electronics Inc., Zetter reported. Wired noted that authorities revoked the certificate after Symantec began its investigation.

Stuxnet was a self-replicating worm that spread to systems around the globe in 2010, but it was targeted specifically at Siemens programmable logic controllers used for centrifuges in Iranian uranium enrichment facilities. Its success in damaging Iran’s nuclear program has led to speculation that similar attacks could be made elsewhere, including against the United States’ critical infrastructure.

Stuxnet was so sophisticated, and required such extensive resources to develop, that security experts said it was likely the work of a nation-state, and a good bit of speculation fell on the United States and Israel. Despite the location of the digital certificate used by Duqu, its source, like that of Stuxnet, is still unknown.

Reader Comments

Tue, Nov 8, 2011 Aurora Cloud

Process Control Systems don't run on Windows. SCADA has many protocols. The question is, how many equipment mfg's have been exploited at the factory? And how did the Sux writer know which box of equip Iran was going to receive by UPS, or was it USPS, or DHL? (o: Mystery afoot.

Mon, Oct 24, 2011

Chip manufacturers are not at fault, here. Stuxnet and DuQu are Windows virii. If you don't run Windows, you aren't vulnerable.

Thu, Oct 20, 2011 Cowboy Joe

Yep - one mad cow can do a lotta' damage to the herd...not to mention the livestock.

Thu, Oct 20, 2011 earth

The creators of Stuxnet planted a seed of the destruction of civilization as we know it. To call it the opening of Pandora’s box would be to severely underestimate the potential for destruction and the effort that will be necessary from this point on to keep civilizations manufacturing capabilities secure. Cruise missiles could take out single factories while variants of this technology could take out whole sectors of manufacturing. Lets hope the chip manufacturers are hardening their systems.

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above