Open-source toolkit finds Duqu infections
A componet of the toolkit can also give an administrator insight into what data was stolen
IDG News Service - The lab credited with discovering the Duqu malware has built an open-source toolkit that administrators can use to see whether their networks are infected.
The Duqu Detector Toolkit v1.01 looks for suspicious files left by Duqu, which has created a buzz in the security community given its stealthy nature and some characteristics it shares with another famous piece of malicious software, Stuxnet.
The Laboratory of Cryptography and System Security (CrySys), part of Budapest University of Technology and Economics based in Hungary, wrote in its release notes that the toolkit, which is composed of four components, looks for strange files that mark an infection.
CrySys said that the toolkit should detect a real active Duqu infection, but it is possible to get a false positive, so it cautioned that administrators will need to analyze the results.
Forensic stand-alone tools such as the one CrySys developed are important since it will give Duqu victims a better image of how they were attacked, said Costin Raiu, director of the global research and analysis team for Kaspersky Lab. Antivirus software does not give the same insight and focuses on instead on detecting and blocking an attack.
"The toolkit released by CrySys Lab is top class," Raiu said. "Of course, all of this can be done 'manually,' but these tools make it much easier to spot anomalies in Duqu-infected computers."
The toolkit also has a component that could let victims figure out what data Duqu has stolen. Costin said stolen data is stored in files ending in "DQ" -- hence the malware's name -- and in "DF."
"I'm sure that any victim wants to know what was stolen from them," Raiu said.
At least one other company has released a detection tool for detecting Duqu. NSS Labs' tool is a script looks for certain strings within drivers employed by Duqu.
Microsoft is in the process of creating a patch for the software vulnerability used by Duqu to infect computers. CrySys is also credited with discovering that Duqu used a previously unknown Windows vulnerability to infect computers after examining an installer file.
A Duqu infection could occur if a person was tricked into opening a malicious Microsoft Word document sent by e-mail to a victim. The vulnerability is in Windows' Win32k TrueType font parsing engine. Microsoft has published a tool to temporarily block attacks until the patch is ready.
Send news tips and comments to email@example.com
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts