Kaspersky Lab Released Review of Malware in October 2011
OREANDA-NEWS. November 18, 2011. The star of the show in October was undoubtedly the Duqu Trojan. Its numerous similarities to the first major cyber weapon, the Stuxnet worm, heightened interest in this newly-discovered malware. The striking parallels between the two malicious programs suggest they were both written by the same group of people or the Stuxnet source code (which has not been made publically available) was used.
There are, however, significant differences between the two programs. In particular, Duqu contains no functionality targeting industrial systems as was the case with Stuxnet. As well as the main module, the Duqu files include an additional Trojan-Spy module capable of intercepting data entered via the keyboard, capturing screenshots, gathering information about the system etc. All this suggests industrial espionage is its main aim, rather than industrial sabotage.
Further investigation by the experts at Kaspersky Lab managed to identify new Duqu victims, primarily in
Attacks on individual users
Bundestrojan
In
This case once again raises questions about the existence of so-called governmental Trojan programs and the legal issues associated with their use. It is worth stressing that Kaspersky Lab, like most other antivirus vendors, takes a firm stance on such questions: we detect, and will continue to detect, all malicious programs regardless of who developed them and why.
Android – top of the hit list
October was a turning point in the world of mobile threats, with Kaspersky Lab data showing that the total number of malicious programs for Android outstripped that for Java 2 Micro Edition for the first time. Malware for J2ME had been the most prevalent among mobile threats for over two years. “The fact that the growth in malware for Android has increased so dramatically indicates that for the time being the virus writers will most probably be concentrating on this operating system,” warns Denis Maslennikov, Senior Malware Analyst at Kaspersky Lab.
Breakdown of mobile threats by platform
The most dangerous Trojan for Mac OS X
October saw the emergence of Trojan-Downloader.OSX.Flashfake.d, a new version of the Flashfake Trojan for Mac OS X, which masquerades as an Adobe Flash Player installation file. Like its predecessors, its main function is to download files. However, new functionality has been added that disables Mac’s built-in protection system XProtect, a simple signature scanner that is updated on a daily basis. Once disabled the protection system cannot receive updates from Apple, rendering it useless. The fact the developers failed to include a self-defense mechanism makes it possible to disable XProtect. After Trojan-Downloader.OSX.Flashfake.d launches on a computer, it not only protects itself from being deleted but also makes the system vulnerable to other malicious programs that would have been detected by the built-in protection system. As a result, this particular Trojan is much more dangerous than other OS X malware.
Attacks on state and corporate networks
When it came to attacks on corporate and state organizations, October was full of incident. Organizations in the
First of all, an attack was detected against members of
More information also emerged about the August attack on Mitsubishi Heavy Industries. The investigation conducted by the
The story of a virus found on the ground control systems of pilotless planes at a
Комментарии