Wednesday, June 29, 2022
  • About us
    • Write for us
    • Disclaimer
    • Terms of use
    • Privacy Policy
  • RSS Feeds
  • Advertise with us
  • Contact us
DefenceTalk
  • Home
  • Defense News
    • Defense & Geopolitics News
    • War Conflicts News
    • Army News
    • Air Force News
    • Navy News
    • Missiles Systems News
    • Nuclear Weapons
    • Defense Technology
    • Cybersecurity News
  • Military Photos
  • Defense Forum
  • Military Videos
  • Military Weapon Systems
    • Weapon Systems
    • Reports
No Result
View All Result
  • Home
  • Defense News
    • Defense & Geopolitics News
    • War Conflicts News
    • Army News
    • Air Force News
    • Navy News
    • Missiles Systems News
    • Nuclear Weapons
    • Defense Technology
    • Cybersecurity News
  • Military Photos
  • Defense Forum
  • Military Videos
  • Military Weapon Systems
    • Weapon Systems
    • Reports
No Result
View All Result
DefenceTalk
No Result
View All Result

Computer worm enabled spying on Iran talks: researchers

by Agence France-Presse
June 11, 2015
in Technology News
2 min read
0
Computer worm enabled spying on Iran talks: researchers
14
VIEWS

A computer worm designed to gather foreign intelligence and widely linked to Israel was used to spy on negotiations with Iran on curtailing its nuclear program, security researchers said Wednesday.

A report by the Russian-based security firm Kaspersky Lab said it discovered the malware dubbed Duqu lurking in its own internal networks and linked the effort to intelligence gathering on the 2014-15 talks with Tehran.

Duqu, which was believed to have been eradicated in 2012, is a sophisticated spy tool similar to the Stuxnet virus.

“The Duqu threat actor went dark in 2012 and was believed to have stopped working on this project — until now,” Kaspersky said in a blog post.

“Our technical analysis indicates the new round of attacks include an updated version of the infamous 2011 Duqu malware, sometimes referred to as the stepbrother of Stuxnet.”

The Stuxnet computer virus, believed to have been developed by the United States or Israel in order to contain threats from Iran, dates back at least to 2007, according to researchers.

Kaspersky researchers said the latest version of Duqu was difficult to detect because it did not change any system settings on computer networks.

The researchers first found the malware on their own systems and then discovered it was targeting victims in Western countries, the Middle East and Asia.

“Most notably, some of the new 2014-2015 infections are linked to the P5+1 events and venues related to the negotiations with Iran about a nuclear deal,” the company said in a statement.

“The threat actor behind Duqu appears to have launched attacks at the venues where the high level talks took place.”

In addition Duqu 2.0 was used to conduct surveillance on politicians and dignitaries attending the 70th anniversary event of the liberation of the Auschwitz-Birkenau concentration camp, according to Kaspersky.

“Besides intellectual property theft, no additional indicators of malicious activity were detected,” the statement said.

“The analysis revealed that the main goal of the attackers was to spy on Kaspersky Lab technologies, ongoing research and internal processes. No interference with processes or systems was detected.”

The Wall Street Journal, which reported the findings earlier Wednesday, said Kaspersky’s research backs its earlier reports that Israel was spying on the nuclear talks.

Tags: hackingirannetwork securitynuclear programnuclear talksSpyingvirusWorm
Previous Post

Mali troops get reacquainted with lost north

Next Post

Spain allows A400M test flights to resume after deadly crash

Related Posts

US moves closer to retaliation over hacking as cyber woes grow

Spain warns of possible cyberattack at NATO summit

June 27, 2022

Spain's defence minister warned on Friday of a possible cyberattack during the NATO summit in Madrid next week. Asked if...

AI Improves Robotic Performance in DARPA’s Machine Common Sense Program

AI Improves Robotic Performance in DARPA’s Machine Common Sense Program

June 23, 2022

Researchers with DARPA's Machine Common Sense (MCS) program demonstrated a series of improvements to robotic system performance over the course...

Next Post
Airbus A400M

Spain allows A400M test flights to resume after deadly crash

Latest Defense News

Former NATO chief Javier Solana has coronavirus

Finland, Sweden leaders to discuss NATO bid with Erdogan

June 27, 2022
Canada sends 2 warships to Baltic Sea to bolster security

Canada sends 2 warships to Baltic Sea to bolster security

June 27, 2022
Russia says first hypersonic missiles enter service

Russia hit a missile factory in Kyiv: defence ministry

June 27, 2022
US moves closer to retaliation over hacking as cyber woes grow

Spain warns of possible cyberattack at NATO summit

June 27, 2022
Kyiv says US precision artillery systems arrived in Ukraine

Kyiv says US precision artillery systems arrived in Ukraine

June 24, 2022
US Navy Kicks Off ICEX 2020

Russia and China eye NATO’s ‘Arctic Achilles heel’

June 24, 2022

Defense Forum Discussions

  • NATO
  • New Zealand Army
  • ADF General discussion thread
  • The Russian-Ukrainian War Thread
  • Indonesian Aero News
  • Philippine Navy Discussion and Updates
  • Royal Australian Navy Discussions and Updates 2.0
  • Royal Netherlands Navy
  • Royal New Zealand Air Force
  • New Coronavirus threat
DefenceTalk

© 2003-2020 DefenceTalk.com

Navigate Site

  • Defence Forum
  • Military Photos
  • RSS Feeds
  • About us
  • Advertise with us
  • Contact us

Follow Us

No Result
View All Result
  • Home
  • Defense News
    • Defense & Geopolitics News
    • War Conflicts News
    • Army News
    • Air Force News
    • Navy News
    • Missiles Systems News
    • Nuclear Weapons
    • Defense Technology
    • Cybersecurity News
  • Military Photos
  • Defense Forum
  • Military Videos
  • Military Weapon Systems
    • Weapon Systems
    • Reports

© 2003-2020 DefenceTalk.com