Kaspersky Lab Released November Review
OREANDA-NEWS. December 27, 2011. The analysis carried out by Kaspersky Lab experts has revealed yet another parallel between Duqu and the Stuxnet worm – both made use of previously unknown vulnerabilities to launch attacks. In the case of Duqu, attacks took place via email with the help of a Microsoft Word document that contained an exploit for a previously unknown vulnerability in Windows. Importantly, by early December Microsoft still hadn’t released a patch to fix this vulnerability, meaning there’s a high risk of it being used in an attack. Kaspersky Lab immediately added a signature for this particular exploit to its product databases. The company’s experts also came to the conclusion that Duqu’s main aim is to gather data on the activities of a series of Iranian companies and government agencies. There are numerous indications that earlier versions of Duqu could have been around since 2007-2008, and that the Stuxnet worm was created on the basis of a platform that was also used during the creation of Duqu.
Out of the box activity
The first instance of Latin American Trojans using steganography in image files was recorded in November. The family of Trojan programs targeted customers of Brazilian banks. This technique allowed the virus creators to kill several birds with one stone. “Firstly, it can cause automatic malware analysis systems to function incorrectly: antivirus programs will give an all-clear to the file after analysis, and in time the link will be exempted from checks altogether,” explains Dmitry Bestuzhev, Head of Kaspersky Lab’s Global Research and Analysis Team for Latin America. “Secondly, the administrators of the sites where the encrypted malicious files are hosted won’t be able to identify them as malicious and will leave them as they are. Thirdly, some malware researchers may not have the time or expertise to deal with them. All of this obviously plays into the hands of the cybercriminals.”
Mobile threats
In the middle of July ‘porn SMS senders’ were targeting users from the
Mac OS threats
Mac users are increasingly feeling the effects of malicious programs being spread in pirated Mac software on torrent trackers. The recently detected Backdoor.OSX.Miner, for example, has several malicious functions: it establishes remote access to an infected computer; gathers information about browsing history in Safari; captures screenshots; steals the wallet.dat file from BitCoin clients; and launches BitCoin miner without user authorization.
This particular malicious program spreads via a number of torrent trackers, including publicbt.com, openbittorrent.com and thepiratebay.org.
Attacks on state and corporate networks More problems with certificates
November saw yet another Dutch certificate authority – KPN – announce that it had been targeted by hackers and forced to halt the issuing of certificates. The breach was discovered on a KPN web server related to Public Key Infrastructure (PKI). The attack dates back no less than four years, raising questions as to how a DDoS tool went undetected for so long.
Like Diginotar, KPN is allowed to issue 'special' certificates for the Dutch government and public services. In fact, many organizations affected by the DigiNotar incident switched to KPN certificates.
However, the Malaysian certificate authority Digicert (CA Digicert
Комментарии