Print 24 comment(s) - last by blankslate.. on Nov 4 at 12:43 PM

No, not THAT Dooku, it's the Duqu worm.  (Source: LucasFilm, Ltd.)
Customers are at high risk after a gaping hole was found in MSO's security

If you just received a Word document from a colleague, don't open it until you verify they really sent it.  A new worm is sweeping the globe and it hides inside innocent-looking Word documents, waiting to strike via a hitherto unknown vulnerability.  

I. Duqu Worm Taps Microsoft Vulnerability, Proliferates

The "Duqu" worm is currently sweeping corporate networks worldwide, seeking to infect as many machines as possible in what appears to be an effort to target power plants, oil refineries and pipelines.  

Microsoft Corp. (MSFT) revealed this week that Duqu uses similar code to the Stuxnet worm, which crippled Iranian nuclear power computer systems in 2010.  Many have voiced suspicions that U.S. defense or intelligence agencies were behind Stuxnet, but it appears extreme unlikely that the U.S. government had anything to do with Duqu.  In fact, Duqu appears to be targeting U.S. allies.

The worm exploits a hitherto-unknown zero-day flaw in Microsoft Office and the Windows operating system.  When the victim receives and opens an infected Word document -- which appears entirely normal -- the worm installs itself on their machines and takes control of the system.

The worm then proceeds to propogate, by opening your contacts lists in programs like Thunderbird and Outlook and then emailing all of your contacts infected documents.

Duqu's attack path
The Duqu worm exploits a previously unknown vulnerability to execute malicious shellcode and gain system access in a sophisticated cyberespionage effort [Source: Symantec]

Microsoft would only comment, "We are working diligently to address this issue and will release a security update for customers."

A Knowledge Base (KB) page on the worm can be found here.  It lists the worm's threat level as "severe".

II. Worm Targets U.S. Allies

Symantec Corp. (SYMC) is among the firms tracking Duqu.  Interestingly, they make some statements about the worm's origin which seemingly exonerate the U.S. from Stuxnet suspicions.  Symantec states that the Duqu authors must have either been given code by the Stuxnet authors, have stolen the code from the Stuxnet authors, or are themselves the Stuxnet authors.  

Symantec's Kevin Haley comments to Reuters, "We believe it is the latter."

The sophistication of this worm suggests that if the U.S. didn't have a hand in crafting it, that China or Russia perhaps did.  A command and control server was found to be hosted in Belgium, but it's rather unlikely that the attackers chose their home nation to host the attacking platform.

China -- a cyber-superpower and notorious aggressor -- is thought to maintain a repository of unpublished vulnerabilities on platforms such as Windows, Linux, and OS X, waiting to exploit them when the need arises.

Nine international organizations have found their systems compromised.  The compromised nations in these victim organizations are:
  • Organization A - France, Netherlands, Switzerland, Ukraine
  • Organization B - India
  • Organization C - Iran
  • Organization D - Iran
  • Organization E - Sudan
  • Organization F - Vietnam
Other researchers report that systems in the United Kingdom, Austria, Hungary, and Indonesia were infected.

Duqu spread
[Source: Symantec]

Sources: Symantec, Reuters

Comments     Threshold

This article is over a month old, voting and posting comments is disabled

RE: What delicious irony
By Tony Swash on 11/4/2011 6:46:24 AM , Rating: 1
There you go again waving reports and "evidence" that nobody in the real world is interested in, convincing no one, talking about vague bad things that will one day happen to Mac security and Mac users. Nobody, except for slightly odd people like us, is listening. In the real world the mass of consumers has a clear view of the security strengths and weaknesses of the Mac and Windows brands, based on a mass of real world evidence over a long period of time. It's not hard for consumers to see what the evidence of the real world tells them; Windows has a terrible security track record and hence have a terrible security brand reputation, Mac has a superb security track record and hence have a stellar security brand reputation.

The only way that will change is not through some geek security event, or some report, or the bleating of Windoze fans, it will only change if millions of Mac suffered some sort of security breach in the real world that affected milions of users. That hasn't happened, though the Windoze fans and phobes keep promising it will 'real soon', and you and I both know it will never happen.

Meanwhill the Mac sales keep increasing and the iPad sales keep increasing. Nice.

RE: What delicious irony
By blankslate on 11/4/2011 12:43:18 PM , Rating: 2
Mac has a superb security track record and hence have a stellar security brand reputation.

There you go again only basing your statements on reputation and a track record from the 80s 90s and early aughts.

A reputation that is based on old information and the fact that Apple's share of the computer market made it not worth the effort malware for the platform.

In a sense writers of malware can service 90 plus percent of their "customers" by focusing on Windows... and the extra effort of paying attention to the "niche" market isn't worth the effort.


So people conflate a lack of effort to exploit their platform of choice as proof that it is secure and are blissfully unaware that their "it just works" boxes are just as vulnerable.

Meanwhile as Apple enjoys increasing sales they slowly draw the attention of people who previously ignored them because there was lower hanging fruit...

Delicious irony indeed.

"Well, we didn't have anyone in line that got shot waiting for our system." -- Nintendo of America Vice President Perrin Kaplan

Copyright 2016 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki