查看: 2891|回复: 7
收起左侧

[交流探讨] 卡巴斯基又发现了新的国家级网络攻击受害者-------自己的内网

[复制链接]
m220011
发表于 2015-6-11 01:54:47 | 显示全部楼层 |阅读模式
本帖最后由 m220011 于 2015-6-11 02:00 编辑


若干个网路系统被入侵

The Mystery of Duqu 2.0: a sophisticated cyberespionage actor returns
New zero-day used for effective kernel memory injection and stealth

By GReAT on June 10, 2015. 12:00 pm

Duqu 2.0 Technical Paper (PDF) can be found here
Indicators of Compromise (IOC) can be found here

Earlier this year, during a security sweep, Kaspersky Lab detected a cyber-intrusion affecting several of our internal systems.

Following this finding, we launched a large scale investigation, which led to the discovery of a new malware platform from one of the most skilled, mysterious and powerful groups in the APT world – Duqu. The Duqu threat actor went dark in 2012 and was believed to have stopped working on this project – until now. Our technical analysis indicates the new round of attacks include an updated version of the infamous 2011 Duqu malware, sometimes referred to as the stepbrother of Stuxnet. We named this new malware and its associated platform “Duqu 2.0”.

Some of the new 2014-2015 Duqu infections are linked to the P5+1 events and venues related to the negotiations with Iran about a nuclear deal. The threat actor behind Duqu appears to have launched attacks at the venues for some of these high level talks. In addition to the P5+1 events, the Duqu 2.0 group has launched a similar attack in relation to the 70th anniversary event of the liberation of Auschwitz-Birkenau.

In the case of Kaspersky Lab, the attack took advantage of a zero-day in the Windows Kernel, and possibly up to two other, currently patched vulnerabilities, which were zero-day at that time. The analysis of the attack revealed that the main goal of the attackers was to spy on Kaspersky Lab technologies, ongoing research and internal processes. No interference with processes or systems was detected. More details can be found in our technical paper.

From a threat actor point of view, the decision to target a world-class security company must be quite difficult. On one hand, it almost surely means the attack will be exposed – it’s very unlikely that the attack will go unnoticed. So the targeting of security companies indicates that either they are very confident they won’t get caught, or perhaps they don’t care much if they are discovered and exposed. By targeting Kaspersky Lab, the Duqu attackers probably took a huge bet hoping they’d remain undiscovered; and lost.

At Kaspersky Lab, we strongly believe in transparency, which is why we are going public with this information. Kaspersky Lab is confident that its clients and partners are safe and that there is no impact on the company’s products, technologies and services.


From https://securelist.com/blog/rese ... nage-actor-returns/

aweister
发表于 2015-6-11 07:38:57 | 显示全部楼层
说明什么?
自制照片
发表于 2015-6-11 10:33:45 | 显示全部楼层
全是英文看不懂,标题看懂了,是不是卡巴也变的不安全了?
静雨
发表于 2015-6-11 11:06:49 | 显示全部楼层
翻译过来是不是就是这个?http://yunjiemi.com/661.html
虚无混沌
发表于 2015-6-11 13:13:22 | 显示全部楼层
并无太大关系,针对不到我等P民。
m220011
 楼主| 发表于 2015-6-11 13:18:55 | 显示全部楼层
静雨 发表于 2015-6-11 11:06
翻译过来是不是就是这个?http://yunjiemi.com/661.html

嗯。没想到还真有人去搬回来了。
这二道贩子的网站真讨厌,连原始出处都不带 http://geek.csdn.net/news/detail/34160
ccboxes
发表于 2015-6-11 15:05:27 | 显示全部楼层
人家那是专攻商业&国家机密的技术,不可能用在个人上,开发成本就至少5000万美元呢。另外仔细看一下文章,这个技术只适用于企业内网等局域网,而且这些人这么处心积虑想要卡巴的源码只证明卡巴就是国际公认的牛叉。
jmkbird
发表于 2015-6-11 22:35:33 | 显示全部楼层
卡巴斯基的分析团队真心欧洲第一啊,世界第一不敢说,前面还有咖啡的团队摆着,不过欧洲没有对手
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2025-2-6 07:01 , Processed in 0.128500 second(s), 16 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表