The mystery of Duqu: part two
Jump to navigation
Jump to search
(Publication) Google search: [1]
The mystery of Duqu: part two | |
---|---|
![]() | |
Botnet | Duqu |
Malware | Duqu (bot) |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2011 / 25 octobre 2011 |
Editor/Conference | Kaspersky lab |
Link | http://www.securelist.com/en/blog/208193197/The Mystery of Duqu Part Two (Archive copy) |
Author | Alexander Gostev |
Type |
Abstract
“ Our investigation and research of Duqu malware continues. In our previous report, we made two points:
- there are more drivers than it was previously thought;
- it is possible that there are additional modules.
Besides those key points, we concluded that unlike the massive Stuxnet infections, Duqu attacks are limited to an extremely small number of targets.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2011BFR931, editor = {Kaspersky lab}, author = {Alexander Gostev}, title = {The mystery of Duqu: part two}, date = {Error: Invalid time.}, month = Error: Invalid time., year = {2011}, howpublished = {\url{http://www.securelist.com/en/blog/208193197/The_Mystery_of_Duqu_Part_Two}}, }