The Cousins of Stuxnet: Duqu, Flame, and Gauss

被引:111
作者
Bencsath, Boldizsar [1 ]
Pek, Gabor [1 ]
Buttyan, Levente [1 ,2 ]
Felegyhazi, Mark [1 ]
机构
[1] Budapest Univ Technol & Econ, Lab Cryptog & Syst Secur CrySyS Lab, Dept Telecommun, Magyar Tudosok Krt 2, H-1117 Budapest, Hungary
[2] Budapest Univ Technol & Econ, MTA BME Informat Syst Res Grp, H-1117 Budapest, Hungary
关键词
targeted attacks; Advanced Persistent Threat (APT); cyber espionage; cyber weapons;
D O I
10.3390/fi4040971
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Stuxnet was the first targeted malware that received worldwide attention for causing physical damage in an industrial infrastructure seemingly isolated from the online world. Stuxnet was a powerful targeted cyber-attack, and soon other malware samples were discovered that belong to this family. In this paper, we will first present our analysis of Duqu, an information-collecting malware sharing striking similarities with Stuxnet. We describe our contributions in the investigation ranging from the original detection of Duqu via finding the dropper file to the design of a Duqu detector toolkit. We then continue with the analysis of the Flame advanced information-gathering malware. Flame is unique in the sense that it used advanced cryptographic techniques to masquerade as a legitimate proxy for the Windows Update service. We also present the newest member of the family, called Gauss, whose unique feature is that one of its modules is encrypted such that it can only be decrypted on its target system; hence, the research community has not yet been able to analyze this module. For this particular malware, we designed a Gauss detector service and we are currently collecting intelligence information to be able to break its very special encryption mechanism. Besides explaining the operation of these pieces of malware, we also examine if and how they could have been detected by vigilant system administrators manually or in a semi-automated manner using available tools. Finally, we discuss lessons that the community can learn from these incidents. We focus on technical issues, and avoid speculations on the origin of these threats and other geopolitical questions.
引用
收藏
页码:971 / 1003
页数:33
相关论文
共 29 条
[1]  
[Anonymous], 2012, DUQ DET VERS 1 24
[2]  
[Anonymous], 2012, GAUSS INF COLL VERS
[3]  
Batler J., VIRUS W32 ALMAN B
[4]  
Bencsath B., 2012, P ACM EUR WORKSH SYS
[5]  
Bencsath B., 2011, DUQU STUXNET MALWARE
[6]  
Falliere N., 2011, W32 STUXNET DOSSIER
[7]  
Filiol E., 2005, P 14 EUR I COMP ANT
[8]  
Freiling F.C., 2007, P INT C IT INC MAN I
[9]  
Gostev A., 2011, TECHNICAL REPORT
[10]  
Gostev A., FLAME BUNNY FROG MUN