Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
CrySyS Lab has updated its Duqu malware detection tool to identify a new variant of the Stuxnet-like trojan, detected this week.
The Duqu malware was sophisticated and dangerous, but not prolific. It had created backdoors in a limited number of industrial systems in Iran, India and some European countries.
But on Tuesday, Symantec researchers said they received a variant of the Windows-based malware that had been tweaked to avoid anti-virus detection.
Researchers passed on the Duqu loader file to the Budapest-based CrySyS (Laboratory of Cryptography and System Security) Lab. It used the file to update its free Duqu detection tool.
The loader file was used to execute the encrypted Duqu malware once an infected machine restarted.
Symantec researchers said the Duqu variant was compiled on 23 February and was tweaked "just enough" to evade anti-virus checks, though the effort was only "partially successful".
The driver file, previously signed with a stolen certificate, was now made to resemble a Microsoft driver they said.
Last week, continued research by Kaspersky and the information security community identified a component of Duqu that was written in a previously alien code.
Input from the community led researchers to confirm the Duqu Framework was compiled with a slightly modified creation of customer object-oriented extension to C.
Work on identifying the creators of Duqu and its command and control servers continues.
Copyright © SC Magazine, Australia
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.