Jump to content

Duqu 2.0

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by Biosthmors (talk | contribs) at 18:14, 5 September 2016. The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Duqu 2.0 is a version of malware reported in 2015 to have infected computers in hotels of Austria and Switzerland that were sites of the international negotiations with Iran over its nuclear program and economic sanctions.[1] Kaspersky discovered the malware, and Symantec confirmed those findings. The malware is a variant of Duqu, and Duqu is a variant of Stuxnet. The software is "linked to Israel", according to The Guardian.[2] The software used three zero day exploits, and would have required funding and organization consistent with a government intelligence agency.[3]

See also

References

  1. ^ http://www.bbc.com/news/world-middle-east-33090381
  2. ^ Duqu 2.0: computer virus 'linked to Israel' found at Iran nuclear talks venue
  3. ^ Leyden, John. "Duqu 2.0 malware buried into Windows PCs using 'stolen Foxconn certs'". The Register. Retrieved 2015-06-16.