Duqu

Type: Keyphrase
Name: Duqu
First reported 22 hours ago - Updated 22 hours ago - 1 reports

This emerging malware sends secret messages and is practically impossible to detect

As if computer malware that steals your data weren’t enough, now there’s a new kind to worry about: Malware that does it via covert messages that are practically impossible to detect. And it’s becoming more prevalent, according to a new paper  by researchers ... [Published Quartz - 22 hours ago]
First reported Jul 20 2014 - Updated Jul 20 2014 - 1 reports

Can India protect itself from cyber threat?

Rajabahadur V Arcot, July 21, 2014: Just think of series of incidents taking place in quick succession across the country that cripples power and water supplies and communication and transportation services to understand their debilitating effects on ... [Published Deccan Herald - Jul 20 2014]
First reported Jul 18 2014 - Updated Jul 18 2014 - 1 reports

The Growing Threat Of Network-Based Steganography

Back in 2011, researchers at the Laboratory of Cryptography and System Security in Budapest, Hungary, discovered an unusual form of malicious software. This malware embeds itself in Microsoft Windows machines, gathers information particularly about industrial ... [Published Technology Review - Jul 18 2014]
Entities: Malware, Duqu, Steganography
First reported Jul 18 2014 - Updated Jul 18 2014 - 1 reports

KTR stresses on public private partnership to address challenges of cyber security threats

Hyderabad, July 18:Confederation of Indian industry organized a one day conference on Cyber Security focusing on counter measures to face the threats, here today.Inaugurating the conference, K T Ramarao, Minister for IT & Panchayat Raj, Government of ... [Published Siasat Daily - Jul 18 2014]
First reported Jul 02 2014 - Updated Jul 02 2014 - 1 reports

Operation Dragonfly Imperils Industrial Protocol

Recent headlines ( here and here) may have struck fear into those living near major energy installations due to references about the Stuxnet malware. In 2009, this particular strain of malware caused significant damage to the Nantanz nuclear facility, ... [Published McAfee Blogs - Jul 02 2014]
First reported Jul 02 2014 - Updated Jul 02 2014 - 1 reports

PTCVoice: What Keeps Businesses From Adopting The Internet Of Things?

By Gail Dutton Remember the Stuxnet worm and Duqu malware. They were cyberattacks that brought down power and industrial systems in 2011 and 2012 by attacking their computer control systems and are harbingers of what could happen more frequently as the ... [Published Atlanta Journal And Constitution - Jul 02 2014]
First reported Jun 25 2014 - Updated Jun 25 2014 - 1 reports

Iran planning civil defense drills today

ˈThese drills will be held with the purpose of confronting possible threats and sabotage attempts by the aliens,ˈ Asghar Zarean said. In January, Iranˈs mission at the United Nations criticized the US for its involvement in cyber attacks ... [Published Islamic Republic News Agency - Jun 25 2014]
Entities: Iran, Nuclear, Cyber Attack
First reported May 13 2014 - Updated May 13 2014 - 1 reports

Cyber Security: A Few Troubling Questions

Rajabahadur V. ArcotWhile information and communication technology continues to contribute in connecting the world and shaping our lives in ways never thought of before, its downside is beginning to cast dark shadows. Hackers and cyber criminals are not ... [Published Industry 2.0 - May 13 2014]
First reported Feb 24 2014 - Updated Feb 24 2014 - 2 reports

South Korea concocting Stuxnet-like virus to infect enemies

Let's hope that somebody in South Korea remembers that malware doesn't respect borders. Stuxnet escaped from its original cage to bite a whole bunch of countries not originally on the hit list, plus it spawned its nasty son, Duqu. ... [Published Naked Security - Sophos - Feb 24 2014]
First reported Feb 10 2014 - Updated Feb 11 2014 - 8 reports

Who’s behind The Mask? A guide to the spyware-on-steroids bundle

The Russian security firm Kaspersky Lab announced late Monday that it had uncovered what it calls “The Mask”, a bundle of cyber-nastiness that was apparently used to spy on people for as much as 7 years. Here’s a primer on what The Mask was apparently ... [Published TheAppleBlog - Feb 11 2014]
First reported Feb 11 2014 - Updated Feb 11 2014 - 1 reports

The Mask: Newly Discovered APT More Sophisticated Than Duqu

A Moscow-based security firm has discovered what it believes to be a sophisticated state-sponsored cyber espionage campaign that has run for at least 5 years. At least 380 individual victims in more than 30 different countries have fallen prey to what ... [Published Infosecurity - Latest - Feb 11 2014]
First reported Feb 04 2014 - Updated Feb 05 2014 - 2 reports

Details Emerge on Latest Adobe Flash Zero-Day Exploit

Exploits for a newly reported zero-day vulnerability in Adobe’s Flash Player drop a password-grabbing Trojan that targets the email and social media accounts of users and organizations in China, researchers at Kaspersky Lab said today. The attacks ... [Published threatpost - The First Stop for Security News - Feb 05 2014]

Quotes

This could have a denial of service effect on applications that are reliant on OPC communications. The OPC acronym comes from "OLE (Object Linking and Embedding) for Process Control and is a software interface standard."
Iranian cyber operations are carried out under the belief that "The cyber arena is actually the arena of the Hidden Imam." [21] Iran’s cyber doctrine relies heavily on asymmetrical warfare tactics...
"The fact that the Careto attackers appear to be speaking the Spanish language is perhaps the most unusual feature," the report says. "While most of the known attacks nowadays are filled with Chinese comments, languages such as German, French or Spanish appear very rarely in APT attacks."
...it one of the most advanced threats at the moment," said Costin Raiu, Director of the Global Research and Analysis Team (GReAT) at Kaspersky Lab. "This level of operational security is not normal for cyber-criminal groups."

More Content

All (44) | News (21) | Reports (0) | Blogs (23) | Audio/Video (0) | Fact Sheets (0) | Press Releases (0)
sort by: Date | Relevance
This emerging malware sends secret messages and... [Published Quartz - 22 hours ago]
Can India protect itself from cyber threat? [Published Deccan Herald - Jul 20 2014]
The Growing Threat Of Network-Based Steganography [Published Technology Review - Jul 18 2014]
KTR stresses on public private partnership to a... [Published Siasat Daily - Jul 18 2014]
Operation Dragonfly Imperils Industrial Protocol [Published McAfee Blogs - Jul 02 2014]
PTCVoice: What Keeps Businesses From Adopting T... [Published Atlanta Journal And Constitution - Jul 02 2014]
PTC​Voice: What Keeps Businesses From Adopting ... [Published Forbes.com - Jul 02 2014]
Iran planning civil defense drills today [Published Islamic Republic News Agency - Jun 25 2014]
Cyber Security: A Few Troubling Questions [Published Industry 2.0 - May 13 2014]
South Korea concocting Stuxnet-like virus to in... [Published Naked Security - Sophos - Feb 24 2014]
South Korea concocting Stuxnet-like virus to in... [Published Security Bloggers Network - Feb 24 2014]
HP Security Research Threat Intelligence Briefi... [Published HP Security Research Blog - Feb 21 2014]
Appsec DC 2012 - Securing Critical Infrastructu... [Published SecurityTube.Net - Feb 21 2014]
New global cyber-espionage operation uncovered [Published telecomasia.net - Feb 17 2014]
Possible state-sponsored cyber attack deemed el... [Published Fierce Government IT - Feb 14 2014]
Automating Anti Spear-Phishing Training [Published Infosecurity - Latest - Feb 12 2014]
The Mask Hack "Beyond Anything We've Seen So Far" [Published PCMag.com Security Coverage [Feed] - Feb 11 2014]
Who’s behind The Mask? A guide to the spyware-o... [Published TheAppleBlog - Feb 11 2014]
Who’s behind The Mask? A guide to the spyware-o... [Published GigaOM Network - Feb 11 2014]
Who’s behind The Mask? A guide to the spyware-o... [Published GigaOM - Feb 11 2014]
“The Mask” Espionage Malware [Published Security Bloggers Network - Feb 11 2014]
Uncovering ‘The Mask’, the most sophisticated m... [Published SiliconANGLE - Feb 11 2014]
The Mask: Newly Discovered APT More Sophisticat... [Published Infosecurity - Latest - Feb 11 2014]
The Most Sophisticated Malware Might Hit You Soon! [Published EFYTimes.com - Feb 11 2014]
Meet Mask, posssibly the most sophisticated mal... [Published Ars Technica - Feb 10 2014]
Meet Mask, posssibly the most sophisticated mal... [Published Ars Technica Risk Assessment - Feb 10 2014]
The Mask [Published Symantec Connect - Security Response - Feb 10 2014]
Cost of conducting APT campaigns is dramaticall... [Published Security Affairs - Feb 09 2014]
Details Emerge on Latest Adobe Flash Zero-Day E... [Published threatpost - The First Stop for Security News - Feb 05 2014]
Fixed a serious flaw in Adobe Flash Player expl... [Published Security Affairs - Feb 04 2014]
1 2
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
Operation Dragonfly Imperils Industrial Protocol [Published McAfee Blogs - Jul 02 2014]
Recent headlines ( here and here) may have struck fear into those living near major energy installations due to references about the Stuxnet malware. In 2009, this particular strain of malware caused significant damage to the Nantanz nuclear facility, ...
South Korea concocting Stuxnet-like virus to in... [Published Naked Security - Sophos - Feb 24 2014]
Let's hope that somebody in South Korea remembers that malware doesn't respect borders. Stuxnet escaped from its original cage to bite a whole bunch of countries not originally on the hit list, plus it spawned its nasty son, Duqu. ...
South Korea concocting Stuxnet-like virus to in... [Published Security Bloggers Network - Feb 24 2014]
Let's hope that somebody in South Korea remembers that malware doesn't respect borders. Stuxnet escaped from its original cage to bite a whole bunch of countries not originally on the hit list, plus it spawned its nasty son, Duqu. ...
HP Security Research Threat Intelligence Briefi... [Published HP Security Research Blog - Feb 21 2014]
Iranian hacker groups and their allies launched increasing numbers of cyber attacks over the last year, despite strict state controls of Internet traffic including: spying, censorship, and filtering laws and technology.  HPSR has observed an increasing ...
Appsec DC 2012 - Securing Critical Infrastructu... [Published SecurityTube.Net - Feb 21 2014]
Slides : - https://www.owasp.org/images/5/5d/ASDC12-Securing_Critical_Infrastructure.pdfAuthor: Francis Cianfrocca, Bayshore NetworksThe actual practice of information assurance in industrial control systems (ICS) has changed very little in recent years, ...
1 2 3 4 5
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.