Cyberwarfare now menacing the enterprise, Kaspersky Lab says
Gauss is another allegedly state sponsored piece of sophisticated malicious software. Again, this software has been difficult for researchers to decipher. "The true purpose of the Gauss malware remains unknown," Raiu said. Buried in Gaus is a "warhead," or a block of code that has been encrypted multiple times, Raiu said. "Nobody has been able to decrypt it to know what it actually does," Raiu said.
Kaspersky's most recent find was Red October. "Red October was extremely targeted," Raiu said. Raiu said that the software targeted government diplomatic institutions, which is not the normal target for profit minded malware writers. It also specifically targeted governments, energy companies, military contractors and aerospace companies.
Red October is also more sophisticated than the average profit-driven malware. It is a modular system. It "looks at what you have on your computer and depending on what you have, and what you do with your computer, [it] will send you dedicated modules for different purposes," Raiu said. One module, for instance, steals data from mobile phones. Another module can retrieve deleted data from USB memory sticks.
The rise of nation state malware is bad news for enterprises in a number of ways, Raiu said.
Cyberwarfare "has a lot of hidden dangers," Raiu said. Weaponized exploits developed by governments can be reused by cyber criminals for profit. Another danger is unintended proliferation. "Cyberweapons, which have the ability to multiply by themselves, can simply get out of control," Raiu said.
In either case, organizations and individuals can suffer from damage from this software, either intentionally or accidentally.
For instance, in January 2010, Google -- rather than a U.S. government agency -- alerted the world about the Aurora malware attack that took place against Google and other large IT companies, charging that the Chinese government was behind the attacks.
Aurora brought about "the first general acceptance of the fact that nation-states were actively developing cyberweapons and fighting against each other," Raiu said. "And the targets weren't necessarily other nation-states, but rather companies from the states."
Even when companies are not the targets, they can still suffer collateral damage, Raiu warned.
For instance, U.S. oil company Chevron reported that its systems were hampered by the Stuxnet virus. It's widely believed in the security community that U.S. and Israeli intelligence agencies created Stuxnet to spy on and disrupt Iran's nuclear operations, though official sources have never confirmed the allegations.
Duqu, widely considered the successor to Stuxnet, has also been inflicting damage on bystanders. This malware is currently spreading across PCs at an alarming rate. In a single day last month, Kaspersky saw a jump of 23 percent in the number of new copies of Duqu that infected PCs Kaspersky monitored, from 31,159 to 38,375.
- Cyberattacks could paralyze U.S., former defense chief warns
- The NSA blame game: Singling out RSA diverts attention from others
- Jury still out on FISA court
- Suspected China-based hackers 'Comment Crew' rises again
- Chinese hackers master the art of lying in wait
- Spy court OK'd all U.S. wiretap requests it received in 2012
- Groups denounce FBI plan to require Internet backdoors for wiretaps
- South Korea cyberattacks hold lessons for U.S.
- U.S. military networks not prepared for cyberthreats, report warns
- Return of CISPA: Cybersecurity boon or privacy threat?
- Why Projects Fail CIOs are expected to deliver more projects that transform business, and do so on time, on budget and with limited resources.
- The New Business Case for Video Conferencing: 7 Real-World Benefits Beyond Cost-Savings This whitepaper provides insight into the value of video conferencing in today's business environment, and how organizations are using visual collaboration to find...
- Gartner Magic Quadrant for Client Management Tools The client management tool market is maturing and evolving to adapt to consumerization, desktop virtualization, and an ongoing need to improve efficiency.
- Audit Ready and Asset Optimized: The Solid Promise of an Intelligent Software Asset Management Solution In this paper Frost & Sullivan examines the benefits of enterprise-grade Software Asset Management solutions, and how these solutions serve as the convergence...
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Cyberwarfare White Papers | Webcasts