New APT Duqu 2.0 Hits High-Value Victims, Including Kaspersky Lab

The Duqu attackers, who are considered by researchers to be at the top of the food chain of APT groups and are responsible for attacking certificate authorities and perhaps spying on Iran’s nuclear program, have resurfaced with a new platform that was used to compromise high-profile victims, including some related to the Iran nuclear talks […]

Espionage has gone digital and we’re just now seeing the beginnings of what will prove to be a “cyber arms race,” according to Mikko Hypponen, Chief Research Officer for the F-Secure, the Finnish security firm. Hypponen laid out his thoughts and recapped the last seven months in threats in the latest edition of the company’s Threat Report (.PDF), released today.

Keeping track of the relationships between various malware families can be hard, especially when you’re talking about espionage tools such as Stuxnet and Gauss. Veracode has put together an infographic as a general recap of the life and times of Stuxnet, the much-discussed cyber worm that first reared its head in mid-2010 after it was found targeting critical infrastructure in Iran. Despite Siemens patching some Stuxnet-like bugs late last month, it’s been a while since we’ve heard from the computer worm. Lately the spotlight has been stolen by a series of Stuxnet descendants such as Duqu, Flame and just revealed yesterday, Gauss.

Subscribe to our newsletter, Threatpost Today!

Get the latest breaking news delivered daily to your inbox.