Movatterモバイル変換


[0]ホーム

URL:


Sign in / up
The Register

Channel

This article is more than1 year old

Duqu 2.0‬ malware buried into Windows PCs using 'stolen Foxconn certs'

Driver signed by Chinese factory giant, says Kaspersky

iconJohn Leyden
Mon 15 Jun 2015 //17:28 UTC

The super-sophisticated malware that infiltrated Kaspersky Labs is craftier than first imagined.

We're told that theDuqu 2.0 software nasty was signed using legit digital certificates issued to Foxconn – a world-leading Chinese electronics manufacturer, whose customers include Microsoft, Dell, Google, BlackBerry, Amazon, Apple, and Sony. The code-signing was uncovered by researchers at Kaspersky Lab, who are studying their Duqu 2.0 infection.

Windows trusts Foxconn-signed code because the Chinese goliath's certificate was issued by VeriSign, which is a trusted certificate root. Thus, the operating system will happily load and run the Foxconn-signed Duqu 2.0's 64-bit kernel-level driver without setting off any alarms. And that would allow the malware to get complete control over the infected machine.

Kaspersky Lab experts reckon Duqu's masterminds have been able to snatch copies of the private keys to various code-signing certificates, using a different one in each attack on an organization. The Foxconn certificate used in this instance was most likely stolen.

The Russian security firm said the Foxconn certificate leak undermines the use of digital certificates as a reliable tool for validating computer code: the whole point of them is to prove that software has not been tampered with, and was built by the vendor signing the executable.

Kaspersky Lab informed Foxconn and VeriSign of its findings before going public with ablog post on the latest twist in the Duqu 2.0 saga.

Aspreviously reported, Duqu 2.0 exploits up to three zero-day vulnerabilities, marking it out as sophisticated and likely the work of an intelligence agency – Israel's spies are suspected. Duqu 2.0 resides solely in the computer’s memory, with no data written to disk. The malware is viewed as an evolution of the earlier Duqu worm, a cyber-espionage toolkit discovered in 2011 and linked to the infamous Stuxnet worm. ®


More about


COMMENTS

TIP US OFF

Send us news


Other stories you might like

Baikonur's only crew-capable pad busted after Soyuz flight

Roscosmos confirms structural damage as images suggest repairs could stretch into 2027
Science28 Nov 2025 |

PostHog admits Shai-Hulud 2.0 was its biggest ever security bungle

Automation flaw in CI/CD workflow let a bad pull request unleash worm into npm
Devops28 Nov 2025 |

Brit telco Brsk confirms breach as bidding begins for 230K+ customer records

Crims claim to know which customers are marked 'vulnerable'
Networks28 Nov 2025 |1

How TeamViewer builds enterprise trust through security-first design

What to do when even your espresso machine needs end-to-end encryption
Sponsored Feature

GrapheneOS bails on OVHcloud over France's privacy stance

Project cites fears of state access as cloud sovereignty row deepens
Security28 Nov 2025 |1

KDE Plasma sets date to dump X11 as Wayland push accelerates

If that's a step too far, then there are new versions of CDE – and tmux
OSes28 Nov 2025 |8

SK hynix wants you to bond with HBM, so it coated corn in banana chocolate

Pushes semiconductor familiarity via chip-shaped edible squares
Systems28 Nov 2025 |5

TryHackMe races to add women to Christmas cyber challenge roster after backlash

Training outfit scrambles to fix all-male lineup before December kickoff
Security28 Nov 2025 |5

GPUs aren't worth their weight in gold – it just feels like they are

Nvidia's accelerators look pricey, but bullion still wins on cost per ounce
Supercomputing Month28 Nov 2025 |8

Windows keeps obsolete strings forever to avoid breaking translations

Another reason why the OS seems to swell with every update
OSes28 Nov 2025 |13

OBR drags in cyber bigwig after Budget leak blunder

Ex-NCSC chief Ciaran Martin asked to examine how forecast ended up online ahead of schedule
Offbeat28 Nov 2025 |18

BOFH: Forward-facing AI brand experience meets forward-facing combustion risk management

Episode 22 All this nonsense and we haven't even had Third Breakfast yet
BOFH28 Nov 2025 |27

[8]ページ先頭

©2009-2025 Movatter.jp