Post from http://www.danieluk.net
A successor to Stuxnet, the sophisticated piece of malware that infected Iran’s nuclear centrifuges around 2010, managed to infiltrate one of the most high-profile cybersecurity groups. Today, Kaspersky Labs published a postmortem on what it calls Duqu 2.0, a derivative of the Duqu program it investigated in 2011; Kaspersky has previously tied Duqu to Stuxnet. Where Duqu and Stuxnet were studied as part of outside investigations, though, Duqu 2.0 appeared right in Kaspersky’s network.
“The thinking behind it is a generation ahead of anything we’d seen earlier — it uses a number of tricks that make it really difficult to detect and neutralize,” writes CEO and co-founder Eugene Kaspersky in a blog post. Kaspersky Labs researchers say that…
Continue reading…
Government malware spied on cybersecurity company, possibly Iran nuclear talks http://www.danieluk.net/news/government-malware-spied-on-cybersecurity-company-possibly-iran-nuclear-talks/
No comments:
Post a Comment