Cyberwarfare now menacing the enterprise, Kaspersky Lab says
Gauss is another allegedly state sponsored piece of sophisticated malicious software. Again, this software has been difficult for researchers to decipher. "The true purpose of the Gauss malware remains unknown," Raiu said. Buried in Gaus is a "warhead," or a block of code that has been encrypted multiple times, Raiu said. "Nobody has been able to decrypt it to know what it actually does," Raiu said.
Kaspersky's most recent find was Red October. "Red October was extremely targeted," Raiu said. Raiu said that the software targeted government diplomatic institutions, which is not the normal target for profit minded malware writers. It also specifically targeted governments, energy companies, military contractors and aerospace companies.
Red October is also more sophisticated than the average profit-driven malware. It is a modular system. It "looks at what you have on your computer and depending on what you have, and what you do with your computer, [it] will send you dedicated modules for different purposes," Raiu said. One module, for instance, steals data from mobile phones. Another module can retrieve deleted data from USB memory sticks.
The rise of nation state malware is bad news for enterprises in a number of ways, Raiu said.
Cyberwarfare "has a lot of hidden dangers," Raiu said. Weaponized exploits developed by governments can be reused by cyber criminals for profit. Another danger is unintended proliferation. "Cyberweapons, which have the ability to multiply by themselves, can simply get out of control," Raiu said.
In either case, organizations and individuals can suffer from damage from this software, either intentionally or accidentally.
For instance, in January 2010, Google -- rather than a U.S. government agency -- alerted the world about the Aurora malware attack that took place against Google and other large IT companies, charging that the Chinese government was behind the attacks.
Aurora brought about "the first general acceptance of the fact that nation-states were actively developing cyberweapons and fighting against each other," Raiu said. "And the targets weren't necessarily other nation-states, but rather companies from the states."
Even when companies are not the targets, they can still suffer collateral damage, Raiu warned.
For instance, U.S. oil company Chevron reported that its systems were hampered by the Stuxnet virus. It's widely believed in the security community that U.S. and Israeli intelligence agencies created Stuxnet to spy on and disrupt Iran's nuclear operations, though official sources have never confirmed the allegations.
Duqu, widely considered the successor to Stuxnet, has also been inflicting damage on bystanders. This malware is currently spreading across PCs at an alarming rate. In a single day last month, Kaspersky saw a jump of 23 percent in the number of new copies of Duqu that infected PCs Kaspersky monitored, from 31,159 to 38,375.
- The NSA blame game: Singling out RSA diverts attention from others
- Jury still out on FISA court
- Suspected China-based hackers 'Comment Crew' rises again
- Chinese hackers master the art of lying in wait
- Spy court OK'd all U.S. wiretap requests it received in 2012
- Groups denounce FBI plan to require Internet backdoors for wiretaps
- South Korea cyberattacks hold lessons for U.S.
- U.S. military networks not prepared for cyberthreats, report warns
- Return of CISPA: Cybersecurity boon or privacy threat?
- New report says cyberspying group linked to China's army
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- HP HAVEn: See the big picture in Big Data HP HAVEn is the industry's first comprehensive, scalable, open, and secure platform for Big Data. Enterprises are drowning in a sea of data...
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,... All Cyberwarfare White Papers | Webcasts