The Duqu cyberespionage group compromised venues hosting Iran nuclear negotiations

Kaspersky Lab discovered a new version of the malware that also infected its systems

The Duqu cyberespionage group targeted the Iran nuclear talks

The Duqu cyberespionage group targeted the Iran nuclear talks

A state-sponsored espionage group that uses a malware platform called Duqu has compromised the computer networks of several hotels and venues that hosted negotiations over Iran's nuclear program.

The attacks that took place in 2014 and this year involved the use of a new version of the Duqu cyberespionage malware, according to antivirus firm Kaspersky Lab, which also found the malware on its own systems.

Kaspersky Lab discovered in early spring that several of its internal systems had been compromised and the subsequent investigation resulted in the identification of what the company now calls Duqu 2.0.

Duqu is a highly sophisticated malware platform used for cyberespionage that was originally found in 2011. It is believed to be related to Stuxnet, the computer worm developed by the U.S. and Israel to sabotage Iran's nuclear program.

Security researchers from different companies tracked Duqu developments for several months after its initial discovery in 2011, but the operation went dark in 2012. This led to a belief that the group behind the malware decided to replace it with something else.

It now turns out that the Duqu creators were actually working on an even more sophisticated version of the malware platform that runs only in the compromised system's memory and doesn't modify disk files or system settings -- Duqu 2.0.

Kaspersky Lab believes that the Duqu 2.0 group first targeted an employee working in one of the company's offices in the Asia and Pacific region, likely through a spear-phishing email. Since the employee's machine was fully patched at the time of the compromise, the company believes that a zero-day exploit was used -- this is an exploit for a previously unknown vulnerability.

The Duqu 2.0 attackers exploited at least one confirmed zero-day vulnerability that was patched by Microsoft on Tuesday, and possibly two other vulnerabilities that are now patched, but had zero-day status when the group was using them, the Kaspersky researchers said in a report released Wednesday.

Zero-day exploits are extremely valuable for attackers and very expensive to buy on the black market. The use of multiple such exploits coupled with the malware platform's complexity -- over 100 plug-ins implementing different functionality -- enforces the belief that Duqu 2.0 is the work of a nation state.

After discovering the infection on its own systems, Kaspersky scanned its global customer base and discovered Duqu 2.0 infections at several hotels that hosted negotiations between Iran and the U.S., Germany, France, Russia, the U.K. and China (P5+1) to find a diplomatic solution that would ensure that Iran's nuclear program is exclusively peaceful. A Duqu 2.0 attack was also associated with an event organized on the 70th anniversary of the liberation of the Auschwitz-Birkenau concentration camp.

The techniques used by the Duqu 2.0 group are, according to the Kaspersky researchers, ahead of anything seen in the advanced persistent threat world.

Its level of sophistication surpasses even the Equation group, which until now has been considered the most sophisticated cyberespionage actor, the Kaspersky researchers said.

Unlike the Equation malware, which uses persistence mechanisms on infected systems, Duqu 2.0 was designed to run only in memory and disappears on reboot. This suggests that its authors know they can regain access to previously compromised systems and reinfect them.

"The Duqu 2.0 threat actor was confident enough to create and manage an entire cyberespionage operation just in memory -- one that could survive within an entire network of compromised computers without relying on any persistence mechanism at all," the Kaspersky researchers wrote.

Most malware creators, including sophisticated ones like the Equation group, are consistent in their use of particular encryption algorithms. With Duqu 2.0, the encryption algorithms used vary from case to case, making it more difficult to establish relationships between infections.

Kaspersky Lab did not speculate on which country might be behind Duqu 2.0, but the Wall Street Journal reported that unnamed former U.S. government officials believe it's Israel.

Join the Good Gear Guide newsletter!

Error: Please check your email address.

Tags intrusionsecuritymalwarekaspersky lab

Our Back to Business guide highlights the best products for you to boost your productivity at home, on the road, at the office, or in the classroom.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Lucian Constantin

IDG News Service
Show Comments

Essentials

Lexar® JumpDrive® S57 USB 3.0 flash drive

Learn more >

Microsoft L5V-00027 Sculpt Ergonomic Keyboard Desktop

Learn more >

Mobile

Lexar® JumpDrive® S45 USB 3.0 flash drive 

Learn more >

Exec

Lexar® Professional 1800x microSDHC™/microSDXC™ UHS-II cards 

Learn more >

HD Pan/Tilt Wi-Fi Camera with Night Vision NC450

Learn more >

Audio-Technica ATH-ANC70 Noise Cancelling Headphones

Learn more >

Lexar® JumpDrive® C20c USB Type-C flash drive 

Learn more >

Budget

Back To Business Guide

Click for more ›

Most Popular Reviews

Latest News Articles

Resources

PCW Evaluation Team

Azadeh Williams

HP OfficeJet Pro 8730

A smarter way to print for busy small business owners, combining speedy printing with scanning and copying, making it easier to produce high quality documents and images at a touch of a button.

Andrew Grant

HP OfficeJet Pro 8730

I've had a multifunction printer in the office going on 10 years now. It was a neat bit of kit back in the day -- print, copy, scan, fax -- when printing over WiFi felt a bit like magic. It’s seen better days though and an upgrade’s well overdue. This HP OfficeJet Pro 8730 looks like it ticks all the same boxes: print, copy, scan, and fax. (Really? Does anyone fax anything any more? I guess it's good to know the facility’s there, just in case.) Printing over WiFi is more-or- less standard these days.

Ed Dawson

HP OfficeJet Pro 8730

As a freelance writer who is always on the go, I like my technology to be both efficient and effective so I can do my job well. The HP OfficeJet Pro 8730 Inkjet Printer ticks all the boxes in terms of form factor, performance and user interface.

Michael Hargreaves

Windows 10 for Business / Dell XPS 13

I’d happily recommend this touchscreen laptop and Windows 10 as a great way to get serious work done at a desk or on the road.

Aysha Strobbe

Windows 10 / HP Spectre x360

Ultimately, I think the Windows 10 environment is excellent for me as it caters for so many different uses. The inclusion of the Xbox app is also great for when you need some downtime too!

Mark Escubio

Windows 10 / Lenovo Yoga 910

For me, the Xbox Play Anywhere is a great new feature as it allows you to play your current Xbox games with higher resolutions and better graphics without forking out extra cash for another copy. Although available titles are still scarce, but I’m sure it will grow in time.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?