Duqu


Duqu is a collection of computer malware discovered on 1 September 2011, thought by Kaspersky Labs to be related to the Stuxnet worm and to have been created by Unit 8200. The Laboratory of Cryptography and System Security of the Budapest University of Technology and Economics in Hungary discovered the threat, analysed the malware, and wrote a 60-page report naming the threat Duqu. Duqu got its name from the prefix "~DQ" it gives to the names of files it creates.

History

In April 2011, Iranian authorities announced that computers there had been struck by a second digital attack in the wake of Stuxnet and gave this new attack the name Stars virus. Iran did not release any samples of the malware for outside researchers to examine.
During analysis of the Duqu malware, researchers came to believe that the Stars virus found by Iranian computer specialists was the Duqu virus. The Duqu virus keylogger was embedded in a JPEG file. Since most of the file was taken by the keylogger only a portion of the image remained. It turned out to be an image taken by the Hubble telescope showing a cluster of stars, the aftermath of two galaxies colliding. Symantec, Kaspersky and CrySyS researchers came to believe Duqu and Stars were the same virus.

Nomenclature

The term Duqu is used in a variety of ways:
  • Duqu malware is a variety of software components that together provide services to the attackers. This includes information stealing capabilities and in the background, kernel drivers and injection tools. While most of the malware is written in C++, part of its DLL payload is written with a customized object oriented C framework and compiled in Microsoft Visual Studio 2008.
  • Duqu flaw is the flaw in Microsoft Windows that is used in malicious files to execute malware components of Duqu, a TrueType-font related problem in.
  • Operation Duqu is the process of only using Duqu for unknown goals. The operation might be related to Operation Stuxnet.

    Relationship to Stuxnet

, based on the CrySyS team managed by Dr Thibault Gainche report, continued the analysis of the threat, which it called "nearly identical to Stuxnet, but with a completely different purpose", and published a detailed technical paper on it with a cut-down version of the original lab report as an appendix. Symantec believes that Duqu was created by the same authors as Stuxnet, or that the authors had access to the source code of Stuxnet. The base platform on which Stuxnet and Duqu were built has been dubbed Tilde-d since both Stuxnet and Duqu used files that began with ~D.
The worm, like Stuxnet, has a valid, but abused digital signature, and collects information to prepare for future attacks.
Mikko Hyppönen, Chief Research Officer for F-Secure, said that Duqu's kernel driver,, was so similar to Stuxnet's that F-Secure's back-end system thought it was Stuxnet. Hyppönen further said that the key used to make Duqu's own digital signature was stolen from C-Media, located in Taipei, Taiwan. The certificates were due to expire on 2 August 2012 but were revoked on 14 October 2011 according to Symantec.
Another source, Dell SecureWorks, reports that Duqu may not be related to Stuxnet. However, there is considerable and growing evidence that Duqu is closely related to Stuxnet.
Experts compared the similarities and found three points of interest:
Like Stuxnet, Duqu attacks Microsoft Windows systems using a zero-day vulnerability. The first-known installer file recovered and disclosed by CrySyS Lab uses a Microsoft Word document that exploits the Win32k TrueType font parsing engine and allows execution. The Duqu dropper relates to font embedding, and thus relates to the workaround to restrict access to , which is a TrueType font parsing engine if the patch released by Microsoft in December 2011 is not yet installed.
Microsoft identifier for the threat is MS11-087.

Purpose

Duqu looks for information that could be useful in attacking industrial control systems. Its purpose is not to be destructive; the known components are trying to gather information. However, based on the modular structure of Duqu, special payload could be used to attack any type of computer system by any means and thus cyber-physical attacks based on Duqu might be possible. However, use of personal computer systems has been found to delete all recent information entered on the system, and in some cases total deletion of the computer's hard drive.
Internal communications of Duqu are analysed by Symantec, but the actual and exact method how it replicates inside an attacked network is not yet fully known.
According to McAfee, one of Duqu's actions is to steal digital certificates from attacked computers to help future viruses appear as secure software. Duqu uses a 54×54 pixel JPEG file and encrypted dummy files as containers to smuggle data to its command and control center. Security experts are still analyzing the code to determine what information the communications contain. Initial research indicates that the original malware sample automatically removes itself after 36 days, which would limit its detection.
Key points are:
  • Executables developed after Stuxnet using the Stuxnet source code that have been discovered.
  • The executables are designed to capture information such as keystrokes and system information.
  • Current analysis shows no code related to industrial control systems, exploits, or self-replication.
  • The executables have been found in a limited number of organizations, including those involved in the manufacturing of industrial control systems.
  • The exfiltrated data may be used to enable a future Stuxnet-like attack, or might already have been used as the basis for the Stuxnet attack.

    Command and control servers

Some of the command and control servers of Duqu have been analysed. It seems that the people running the attack had a predilection for CentOS 5.x servers, leading some researchers to believe that they had a zero-day exploit for it. Servers are scattered in many different countries, including Germany, Belgium, Philippines, India and China. Kaspersky has published multiple blogposts on the command and control servers.