{"id":17324,"date":"2011-11-22T16:13:17","date_gmt":"2011-11-22T06:13:17","guid":{"rendered":"http:\/\/power-up.space\/?p=17324"},"modified":"2011-11-22T16:13:17","modified_gmt":"2011-11-22T06:13:17","slug":"kaspersky-lab-launches-e-mail-%e2%80%98hotline%e2%80%99-for-duqu-victims","status":"publish","type":"post","link":"https:\/\/www.impulsegamer.com\/wordpress\/?p=17324","title":{"rendered":"Kaspersky Lab Launches E-mail \u2018Hotline\u2019 for Duqu Victims"},"content":{"rendered":"<p>The recent outbreak of the Duqu Trojan, a sibling of the infamous Stuxnet industrial malware, has become yet another example of a highly sophisticated cybercriminal act. The analysis carried out by Kaspersky Lab\u2019s experts has proven that Duqu was used as a weapon for targeted attacks on certain businesses; as such, every single Duqu infection is no mere accident. In a move to aid Duqu analysis and treatment, Kaspersky Lab has set up a special e-mail address which companies and individuals can use to contact the company\u2019s experts and request help in investigating an infection with Duqu.<\/p>\n<p>The <a href=\"mailto:stopduqu@kaspersky.com\">stopduqu@kaspersky.com<\/a> e-mail is a digital hotline for those who may discover a Duqu infection on their PC. It is important to understand that the \u201cremediate and forget\u201d approach does not work for Duqu. Any infection attempt signals that it was important for cybercriminals to gain control over a certain system, so there\u2019d be a high chance of repeated attacks using various other methods. By contacting Kaspersky Lab businesses and individuals can ensure the safety of their sensitive data.<\/p>\n<p>The recent Duqu-related discoveries by Kaspersky Lab\u2019s experts have <a href=\"http:\/\/www.kaspersky.com\/about\/news\/virus\/2011\/Kaspersky_Lab_Continues_Its_Duqu_Investigation_From_Jason_Bourne_to_Dexter\">revealed<\/a> its method of infection, which was previously unknown. It turns out that the Trojan\u2019s penetration method made use of carefully tailored socially-engineered e-mails. These e-mails contain a Word .doc file that exploits a zero-day <a href=\"http:\/\/www.kaspersky.com\/about\/news\/product\/2011\/Kaspersky_Lab_Protects_Against_Duqu-originated_Zero-day_Vulnerability_in_Windows\">vulnerability<\/a> in Microsoft Windows\u2019 font-parsing engine. Although the permanent fix for this vulnerability is yet to be released by Microsoft, Kaspersky Lab\u2019s security products already detect and block the exploits using this security hole as well as all known modifications of Duqu itself.<\/p>\n<p>In the latest update on Duqu analysis, the Trojan\u2019s driver \u2013 the first component to be loaded in the system \u2013 is described. The method of how it contacts the command and control server is also revealed, as well as the fact that the payload DLL \u2013 another component of Duqu \u2013 is able to connect to network shares and even become a control server for other machines. Kaspersky Lab\u2019s experts will continue their analysis of the complex structure of the payload, which has, among other features, a special functionality for stealing sensitive data.<\/p>\n<p>&nbsp;<\/p>\n<p>Detailed results of the Duqu analysis update are available <a href=\"http:\/\/www.securelist.com\/en\/blog\/606\/The_Mystery_of_Duqu_Part_Five\">here<\/a> at Securelist.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The recent outbreak of the Duqu Trojan, a sibling of the infamous Stuxnet industrial malware, has become yet another example of a highly sophisticated cybercriminal act. The analysis carried out by Kaspersky Lab\u2019s experts has proven that Duqu was used as a weapon for targeted attacks on certain businesses; as such, every single Duqu infection<\/p>\n<p class=\"more-link\"><a href=\"https:\/\/www.impulsegamer.com\/wordpress\/?p=17324\">Read More\u2026<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-17324","post","type-post","status-publish","format-standard","hentry","category-game-news"],"_links":{"self":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/17324","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=17324"}],"version-history":[{"count":1,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/17324\/revisions"}],"predecessor-version":[{"id":17326,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/17324\/revisions\/17326"}],"wp:attachment":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=17324"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=17324"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=17324"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}