Source: Computerworld by Gregg Keizer In this article “Duqu, the malware that has been compared to 2010’s notorious Stuxnet, is back, security researchers said today. After a several-month sabbatical, the Duqu makers recompiled one of the Trojan’s components in late February, said Liam O Murchu, manager of operations at Symantec’s security response team. The system driver, which is installed… Read More »
Source: Wired by Kim Zetter In this article “DuQu, the malicious code that followed in the wake of the infamous Stuxnet code, has been analyzed nearly as much as its predecessor. But one part of the code remains a mystery, and researchers are asking programmers for help in solving it. The mystery concerns an essential component of the malware… Read More »
Source: Computerworld by Lucian Constantin In this article “Researchers showcased unpatched security flaws in software used to control critical industrial systems by oil, gas, water and electrical distribution plants at the 2012 SCADA Security Scientific Symposium (S4) on Thursday. The vulnerabilities ranged from information disclosure and privilege escalation bugs to remote denial-of-service (DoS) and arbitrary code execution flaws. The… Read More »
On this article on itnews.com Stuxnet and Duqu according to the Russian research firm Kaspersky Lab, are two of a serious of malware developed using the same modular platform. According to the Russian firm new malware can be created just by adding and removing modules. Interesting article.
Source: DEBKA file Is the Stuxnet computer malworm back on the warpath in Iran? Exhaustive investigations into the deadly explosion last Saturday, Nov. 12 of the Sejil-2 ballistic missile at the Revolutionary Guards (IRGC) Alghadir base point increasingly to a technical fault originating in the computer system controlling the missile and not the missile itself. The head of… Read More »