DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Duqu Virus More Serious Threat Than Previously Thought

Posted on November 13, 2011 by Lee J

The Duqu Virus, which was discovered in computers around the world two months ago, may be a more serious threat to data security than previously thought. Computer scientists at the Kaspersky Lab in Moscow revealed yesterday that the way the virus went about attacking individual computers was much more complicated than it had been considered to be the case when it was first discovered. According to their findings, each of the eight concentrated attacks against the computer infrastructure of large companies around the world had been uniquely designed. All of the attacks included variations of fake email messages and Word documents, which, if opened, would trigger the virus via unique fonts that had been purposefully embedded in the documents by the creators of the virus. These modifications would take place immediately before an attack was to be launched and have proven difficult to detect. This kind of sophistication was not recognized during the initial examinations of the virus. According to a report published by the scientists and quoted in publications such as Computerworld and PC World, the creators of Duqu spent a number of years creating the virus. Traces of data sources going back to 2007 and 2008 are seen as evidence for that Microsoft has confirmed that Duqu takes advantage of a deficiency within one of its model drivers, which allows the virus to temporarily gain access to a PC. Then, once opened, the virus installs itself automatically. The firm has not been able to fix this problem so far and is calling on users (especially IT professionals at large companies) to protect themselves by disabling certain font features. More information on this can be found on the technical support section of Microsoft’s website.


Related:

  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • KT Chief to Resign After Cybersecurity Breach Resolution
  • Cyber-Attack On Bectu’s Parent Union Sparks UK National Security Concerns
  • A business's cyber insurance policy included ransom coverage, but when they needed it, the insurer refused to pay. Why?
  • Before Their Telegram Channel Was Banned Again, ScatteredLAPSUS$Hunters Dropped Files Doxing Government Employees (2)
  • Attorney General James Secures $14.2 Million from Car Insurance Companies Over Data Breaches
Category: Breach Incidents

Post navigation

← Latest antiSec video calls for more hacks on governments
Reddit, I just came across a list of about 47k emails and passwords. →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Des Moines Man Charged with Computer Fraud
  • CrowdStrike catches insider feeding information to ScatteredLapsus$Hunters
  • Two suspected Scattered Spider hackers plead not guilty over Transport for London cyberattack
  • Attleboro investigating ‘cybersecurity incident’ impacting city’s IT systems
  • Fired techie admits sabotaging ex-employer, causing $862K in damage
  • Threat actors have reportedly launched yet another campaign involving an application connected to Salesforce
  • Russian hackers target IVF clinics across UK used by thousands of couples
  • US, allies sanction Russian bulletproof hosting services for ransomware support
  • Researchers claim ‘largest leak ever’ after uncovering WhatsApp enumeration flaw
  • Large medical lab in South Africa suffers multiple data breaches

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Cole v. Quest Diagnostics: The Third Circuit Weighs in on Pixels, Privacy, and Medical Data
  • Closing the Privacy Gap: HIPRA Targets Health Apps and Wearables
  • Researchers claim ‘largest leak ever’ after uncovering WhatsApp enumeration flaw
  • CIPL Publishes Discussion Paper Comparing U.S. State Privacy Law Definitions of Personal Data and Sensitive Data
  • India’s Digital Personal Data Protection Act 2023 brought into force

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.