Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Duqu 2.0

From Wikipedia, the free encyclopedia
Computer malware

Duqu 2.0 is a version ofmalware reported in 2015 to have infected computers in hotels of Austria and Switzerland that were sites of the international negotiations with Iran over its nuclear program and economic sanctions.[1] The malware, which infected Kaspersky Lab for months without their knowledge,[2] is believed to be the work ofUnit 8200, anIsraeli Intelligence Corps unit of theIsrael Defense Forces. The New York Times alleges this breach of Kaspersky in 2014 is what allowed Israel to notify the US ofRussian hackers using Kaspersky software to retrieve sensitive data.[3]

Kaspersky discovered the malware, andSymantec confirmed those findings. The malware is a variant ofDuqu, and Duqu is a variant ofStuxnet. The software is "linked to Israel", according toThe Guardian.[4] The software used threezero-day exploits,[5] and would have required funding and organization consistent with a government intelligence agency.[6]

According to Kaspersky, "the philosophy and way of thinking of the “Duqu 2.0” group is a generation ahead of anything seen in the advanced persistent threats world."[7]

See also

[edit]

References

[edit]
  1. ^"Iran nuclear talks: Israel denies bugging venues".BBC News. 11 June 2015. Retrieved23 June 2017.
  2. ^Hackers PWNED Kaspersky Lab servers for months -- Duqu 2.0 blamed on IsraelArchived 2018-07-21 at theWayback Machine By Richi Jennings, Computerworld | JUN 11, 2015
  3. ^Perlroth, Nicole; Shane, Scott (2017-10-10)."How Israel Caught Russian Hackers Scouring the World for U.S. Secrets".The New York Times.ISSN 0362-4331. Retrieved2019-12-13.
  4. ^Gibbs, Samuel (11 June 2015)."Duqu 2.0: computer virus 'linked to Israel' found at Iran nuclear talks venue".The Guardian. Retrieved23 June 2017.
  5. ^Maynard, Peter; McLaughlin, Kieran; Sezer, Sakir (February 2016)."Modelling Duqu 2.0 Malware using Attack Trees with Sequential Conjunction".ICISSP:465–472.doi:10.5220/0005745704650472.ISBN 978-989-758-167-0.S2CID 13469758. Retrieved24 July 2017.
  6. ^Leyden, John."Duqu 2.0 malware buried into Windows PCs using 'stolen Foxconn certs'".The Register. Retrieved2015-06-16.
  7. ^The Duqu 2.0 Targeted Attacks
Hacking in the 2010s
Major incidents
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
Hacktivism
Groups
Individuals
Majorvulnerabilities
publiclydisclosed
Malware
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019


Stub icon

Thismalware-related article is astub. You can help Wikipedia byexpanding it.

Retrieved from "https://en.wikipedia.org/w/index.php?title=Duqu_2.0&oldid=1314357968"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp