Lumension® Endpoint Intelligence Center

Intelligence Center » News Archive » New APT Duqu 2.0 hits high-value victims, including Kaspersky Lab

New APT Duqu 2.0 hits high-value victims, including Kaspersky Lab

2015/06/10

Threatpost - (International) Security researchers from Kaspersky Lab discovered that the Duqu advanced persistent threat (APT) group had used a new platform dubbed Duqu 2.0 to compromise the lab's systems along with about 100 other victims between 2014 - 2015, most of whom were related to P5 + 1 talks over Iran's nuclear program. The APT group seeks to gain access to intellectual property by attacking systems using modules residing entirely in-memory via Windows zero-day vulnerabilities to inject a backdoor and a larger espionage platform with extensive capabilities.

Source: https://threatpost.com/duqu-resurfaces-with-new-round-of-victims-including-kaspersky-lab/113237

Note: This news synopsis is taken from the DHS Daily Open Source Infrastructure Report, a daily [Monday through Friday, except US Federal holidays] summary of open-source published information concerning significant critical infrastructure issues; a 10-day archive of the DOSIR can be found at: http://www.dhs.gov/dhs-daily-open-source-infrastructure-report.


Last Updated: 27 May 2016 10:24:27