- Iran: Eight Prisoners Hanged on Drug Charges
- Daughter of late Iranian president jailed for ‘spreading lies’ - IRAN: Annual report on the death penalty 2016 - Taheri Facing the Death Penalty Again - Dedicated team seeking return of missing agent in Iran - Iran Arrests 2, Seizes Bibles During Catholic Crackdown
- Trump to welcome Netanyahu as Palestinians fear U.S. shift
- Details of Iran nuclear deal still secret as US-Tehran relations unravel - Will Trump's Next Iran Sanctions Target China's Banks? - Don’t ‘tear up’ the Iran deal. Let it fail on its own. - Iran Has Changed, But For The Worse - Iran nuclear deal ‘on life support,’ Priebus says
- Female Activist Criticizes Rouhani’s Failure to Protect Citizens
- Iran’s 1st female bodybuilder tells her story - Iranian lady becomes a Dollar Millionaire on Valentine’s Day - Two women arrested after being filmed riding motorbike in Iran - 43,000 Cases of Child Marriage in Iran - Woman Investigating Clinton Foundation Child Trafficking KILLED!
- Senior Senators, ex-US officials urge firm policy on Iran
- In backing Syria's Assad, Russia looks to outdo Iran - Six out of 10 People in France ‘Don’t Feel Safe Anywhere’ - The liberal narrative is in denial about Iran - Netanyahu urges Putin to block Iranian power corridor - Iran Poses ‘Greatest Long Term Threat’ To Mid-East Security |
Friday 21 October 2011New virus threatens Iran’s nuclear program
First there was the Stuxnet computer virus that wreaked havoc on Iran's nuclear program. Now comes "Duqu," which researchers on Tuesday said appears to be quite similar. Security software firm Symantec said in a report it was alerted by a research lab with international connections on Friday to a malicious code that "appeared to be very similar to Stuxnet." It was named Duqu because it creates files with "DQ" in the prefix. The US Department of Homeland Security said it was aware of the reports and was taking action. "DHS' Industrial Control Systems Cyber Emergency Response Team has issued a public alert and will continue working with the cyber security research community to gather and analyze data and disseminate further information to our critical infrastructure partners as it becomes available," a DHS official said. Symantec said samples recovered from computer systems in Europe and a detailed report from the unnamed research lab confirmed the new threat was similar to Stuxnet. "Parts of Duqu are nearly identical to Stuxnet, but with a completely different purpose," Symantec said. "Duqu is essentially the precursor to a future Stuxnet-like attack." Stuxnet is a malicious software that targets widely used industrial control systems built by German firm Siemens. It is believed to have crippled centrifuges Iran uses to enrich uranium for what the United States and some European nations have charged is a covert nuclear weapons program. Cyber experts say its sophistication indicates that Stuxnet was produced possibly by the United States or Israel. The new Duqu computer virus is designed to gather data from industrial control system manufacturers to make it easier to launch an attack in the future by capturing information including keystrokes. "The attackers are looking for information such as design documents that could help them mount a future attack on an industrial control facility," Symantec said. "Duqu does not contain any code related to industrial control systems and is primarily a remote access Trojan (RAT)," Symantec said. "The threat does not self-replicate." Duqu shares "a great deal of code with Stuxnet" but instead of being designed to sabotage an industrial control system, the new virus is designed to gain remote access capabilities. "The creators of Duqu had access to the source code of Stuxnet," Symantec said. Source: Ynetnews |