1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

The Duqu cyberespionage group compromised venues hosting Iran nuclear negotiations

Discussion in 'Network World' started by RSS, Jun 10, 2015.

  1. RSS

    RSS New Member Member

    A state-sponsored espionage group that uses a malware platform called Duqu has compromised the computer networks of several hotels and venues that hosted negotiations over Iran’s nuclear program.

    The attacks that took place in 2014 and this year involved the use of a new version of the Duqu cyberespionage malware, according to antivirus firm Kaspersky Lab, which also found the malware on its own systems.

    Kaspersky Lab discovered in early spring that several of its internal systems had been compromised and the subsequent investigation resulted in the identification of what the company now calls Duqu 2.0.

    Duqu is a highly sophisticated malware platform used for cyberespionage that was originally found in 2011. It is believed to be related to Stuxnet, the computer worm developed by the U.S. and Israel to sabotage Iran’s nuclear program.

    To read this article in full or to leave a comment, please click here

    Continue reading...
     

Share This Page