Explore the latest news and trends  

Sign up for our weekly security newsletter

Be the first to receive important updates on security


Kaspersky Links Peculiar Malware of April 2012 to Duqu/Stuxnet

Kaspersky Lab's research team lately revealed information from which it seems that the peculiar malicious program, which struck the computers of the Iranian Ministry of Oil, during April 2012, maybe having an association with the spying malware programs namely 'Duqu' and 'Stuxnet.'

Actually, the International Telecommunication Union had asked Kaspersky to do a study of certain fresh and extremely damaging malicious software called 'Wiper.' But, as the security company searched for Wiper, it, instead of finding the program, stumbled over 'Flame.' The non-discovery of Wiper clearly explains that it destroys disks, while during the process it also ensures self-elimination without leaving any trace.

Now, Duqu and Stuxnet utilize codes having filenames starting with ~D. Based on that Kaspersky thinks Wiper maybe likewise related. The company, which hunted for more malware with filenames beginning similarly, discovered quite a few on West Asian cyber space with the name ~DEB93D.tmp. This was not Wiper rather it was Flame as discovered for the first time.

And though Flame was found while hunting for Wiper, Kaspersky's researchers conclude that the two are distinctly separate malware.

A very effective malware, Wiper can trigger others for designing fresh imitations of highly-damaging malicious programs, like Shamoon, says Kaspersky.

Explaining further Chief Security Expert Alexander Gostev at Kaspersky Lab stated that from the study of whatever content Wiper left behind on the Internet-connected computers' hard disk graphics, it was certain that the program was prevalent as also utilized for attacking PCs in West Asia during April 2012 or possibly during December 2011 too. (As said earlier) Wiper was distinguishably different from Flame following the hunt to get the former. The damaging nature of Wiper together with files installed on data-erased computers intensely looked like software, which utilized the Tilded environment. The code-system of Flame wholly differed as well as was made for launching one detailed and sustainable online surveillance scheme. The research team also didn't detect the same damaging activity by Wiper in Flame while it examined the latter, Gostev added. Albawaba.com published this, September 2, 2012.

Eventually, according to Kaspersky, its hunt to obtain Wiper goes on as does for a possible safeguard.

Related article: Kaspersky Predicts Ransomware Threats For 2007

ยป SPAMfighter News - 9/10/2012

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page