Nasty "Duqu" Worm Exploits Same Microsoft Office Bug as Stuxnet
November 2, 2011 12:32 PM
comment(s) - last by
No, not THAT Dooku, it's the Duqu worm.
(Source: LucasFilm, Ltd.)
Customers are at high risk after a gaping hole was found in MSO's security
If you just received a Word document from a colleague, don't open it until you verify they
sent it. A new worm is sweeping the globe and it hides inside innocent-looking Word documents, waiting to strike via a hitherto unknown vulnerability.
I. Duqu Worm Taps Microsoft Vulnerability, Proliferates
The "Duqu" worm is currently sweeping corporate networks worldwide, seeking to infect as many machines as possible in what appears to be an effort to target power plants, oil refineries and pipelines.
Microsoft Corp. (
) revealed this week that Duqu uses similar code to
the Stuxnet worm
crippled Iranian nuclear power computer systems
in 2010. Many have voiced suspicions that U.S. defense or intelligence agencies were behind Stuxnet, but it appears extreme unlikely that the U.S. government had anything to do with Duqu. In fact, Duqu appears to be targeting U.S. allies.
The worm exploits a hitherto-unknown zero-day flaw in Microsoft Office and the Windows operating system. When the victim receives and opens an infected Word document -- which appears entirely normal -- the worm installs itself on their machines and takes control of the system.
The worm then proceeds to propogate, by opening your contacts lists in programs like Thunderbird and Outlook and then emailing all of your contacts infected documents.
The Duqu worm exploits a previously unknown vulnerability to execute malicious shellcode and gain system access in a sophisticated cyberespionage effort [Source: Symantec]
Microsoft would only comment, "We are working diligently to address this issue and will release a security update for customers."
A Knowledge Base (KB) page on the worm can be found
. It lists the worm's threat level as "severe".
II. Worm Targets U.S. Allies
Symantec Corp. (
) is among the firms tracking Duqu. Interestingly, they make some statements about the worm's origin which seemingly exonerate the U.S. from Stuxnet suspicions. Symantec states that the Duqu authors must have either been given code by the Stuxnet authors, have stolen the code from the Stuxnet authors, or
themselves the Stuxnet authors.
Symantec's Kevin Haley
, "We believe it is the latter."
The sophistication of this worm suggests that if the U.S. didn't have a hand in crafting it, that China or Russia perhaps did. A command and control server was found to be hosted in Belgium, but it's rather unlikely that the attackers chose their home nation to host the attacking platform.
a cyber-superpower and notorious aggressor
-- is thought to maintain a repository of unpublished vulnerabilities on platforms such as Windows, Linux, and OS X, waiting to exploit them when the need arises.
Nine international organizations have found their systems compromised. The compromised nations in these victim organizations are:
Organization A - France, Netherlands, Switzerland, Ukraine
Organization B - India
Organization C - Iran
Organization D - Iran
Organization E - Sudan
Organization F - Vietnam
Other researchers report that systems in the United Kingdom, Austria, Hungary, and Indonesia were infected.
This article is over a month old, voting and posting comments is disabled
Oh the joy!
11/2/2011 1:02:27 PM
This is why, leaving holes in software for big brother is a bad idea. This is why letting big brother have the power to pressure companies to introduce these 'features' while muzzling the companies, is a horrible idea...
Way to go US government, bet you didn't expect to see this one biting your arse.
RE: Oh the joy!
11/3/2011 12:49:38 PM
You honestly believe this was a known exploit left open for some nefarious purpose? I suppose the moon landing was fake and the US government was behind 9/11 too right?
You don't know anything about software development, do you? Or the fact that Windows and Office contain 30+ million lines of code between the two programs. And since it is man made there will be flaws in the software. Usually these flaws are caught before an exploit is launched but unfortunately in this case it wasn't.
RE: Oh the joy!
11/4/2011 12:00:00 PM
Why do you think the US governament makes a MUST to give them the master password on commercial firewalls if they want to sell or offer them in the US?
"Mac OS X is like living in a farmhouse in the country with no locks, and Windows is living in a house with bars on the windows in the bad part of town." -- Charlie Miller
U.S. Suspects Chinese Involvement in Satellite Hacks; China Denies Accusations
October 31, 2011, 12:06 PM
Iran Say it Has Captured "Western Spies" Involved in Nuclear Cyberattack
October 5, 2010, 11:29 AM
Israel Suspected in Worm Sabotage of Iran's First Nuclear Plant
September 27, 2010, 10:45 AM
Twitter Senior VP: "Diversity is Important, But We Can’t Lower the Bar"
November 9, 2015, 9:59 AM
CNN Resorts to Internet Censorship to Promote Clinton Over Senator Sanders
October 15, 2015, 2:47 PM
Breaking Bad: How to Crash Google's Chrome Browser With Just 8 Characters
September 23, 2015, 11:08 AM
Quick Note: Amazon UK Offers £10 Back on Any Order £50 or Over
August 3, 2015, 12:05 PM
Editorial: Reddit Allows Itself to be Hijacked as a Hate Platform For Racist Bigots
July 21, 2015, 6:32 PM
Mozilla and Facebook to Adobe: It's Time to Kill Flash
July 20, 2015, 6:30 PM
Latest Blog Posts
Sceptre Airs 27", 120 Hz. 1080p Monitor/HDTV w/ 5 ms Response Time for $220
Dec 3, 2014, 10:32 PM
Costco Gives Employees Thanksgiving Off; Wal-Mart Leads "Black Thursday" Charge
Oct 29, 2014, 9:57 PM
"Bear Selfies" Fad Could Turn Deadly, Warn Nevada Wildlife Officials
Oct 28, 2014, 12:00 PM
The Surface Mini That Was Never Released Gets "Hands On" Treatment
Sep 26, 2014, 8:22 AM
ISIS Imposes Ban on Teaching Evolution in Iraq
Sep 17, 2014, 5:22 PM
More Blog Posts
Copyright 2016 DailyTech LLC. -
Terms, Conditions & Privacy Information