New State-Sponsored Malware "Gauss" Making the Rounds 106
EliSowash writes "A newly uncovered espionage tool, apparently designed by the same people behind the state-sponsored Flame malware that infiltrated machines in Iran, has been found infecting systems in other countries in the Middle East, according to Kaspersky researchers. Gauss is a nation-state-sponsored banking Trojan which carries a warhead of unknown designation. Besides stealing various kinds of data from infected Windows machines, it also includes an unknown, encrypted payload which is activated on certain specific system configurations. Just like Duqu was based on the 'Tilded' platform on which Stuxnet was developed, Gauss is based on the 'Flame' platform."
Re:Yet another part of the world getting pissed of (Score:5, Funny)
I'M A LEBANESE
Pics or... wait, I misread that.
Re: (Score:1)
Re: (Score:1)
Yeah, the island of Lesbos isn't big enough to be considered a nation. Any 4th grader should know at least that much geography.
Names (Score:1, Funny)
I want to name the next Malware Browncoat, because that is what Mal wears.
Re: (Score:2)
Re: (Score:3)
Yes, I believe he was hoping for a picture of that rim... oh shot...
Sorry. misread that.
Re: (Score:2, Funny)
Re: (Score:1)
Clandestine operation have plenty of use for unofficially raised funds. Remember Iran-Contra?
Here's a refresher [youtube.com] for those who don't.
So stupid it's got to be official. (Score:5, Insightful)
Governments releasing digital weapons on the internet. Thanks for the R&D!
COPY/PASTE.
Re: (Score:2)
yes but when you use it you are a threat to national security/terrorist....
hmm wonder if copy/paste can be declared a wmd
Re:So stupid it's got to be official. (Score:4, Interesting)
yes but when you use it you are a threat to national security/terrorist....
Unless you run a bank like HSBC.
Then you get a slap on the wrist and stern talkin' to. [bdnews24.com]
Gitmo is reserved for the proles; Party members need not concern themselves.
Re:So stupid it's got to be official. (Score:4, Informative)
Re: (Score:2)
Cool. So it just tries whatever configuration it finds itself on and, if it decrypts, bam. That's probably a useful little trick to remember.
Re: (Score:2)
Re: (Score:2, Interesting)
It takes time to develop and test an update and flash a system (not to mention money). Gauss is certainly time-limited, but that might be a feature. If you wanted to shut down Iranian centrifuges, for example, you could just send out a copy specific to those configurations. The Iranian centrifuge operators get attacked, realized they're the target (but nobody believes them), and spend time and money flashing their systems. Next week, Gauss2 comes out, same as last time but with "Penis" appended to the v
Re: (Score:2)
But something doesn't add up there... If they can reverse engineer and spoof the configuration, why are they unable to decrypt the payload?
I was under the impression that if a system has the knowledge to decrypt something, and you have access to that system, you will be able to get to the protected data. If what you say is true, what else is preventing them from busting the crypto?
This certainly has my curiosity bone tickled.
Re: (Score:2)
Guessing they haven't figured out what that configuration is.
Re: (Score:2)
They can't decrypt it today because Kaspersky doesn't know who the target is, was, or what their configuration looks like.
Let's think about its predecessor, Stuxnet, for a minute. Stuxnet's authors made several big security mistakes. First they gave away a free copy of "How to attack Iranian nuclear centrifuge systems via SCADA vulnerabilities" to every script kiddy on the planet; plus, they essentially told Iran "it's you." They seriously underestimated the ability of various groups of people to disass
Re: (Score:2)
Re: (Score:2)
Close, but not quite.
Some time a while ago, Gauss surveyed every victim's computer, reporting their config data to the CC servers.
The attackers identified a specific victim, and used that victim's config data to generate a key. The payload was then encrypted by the attackers with that particular key, and then delivered to every active Gauss zombie by the CC server.
The Gauss zombies don't ever carry the key, they always generate it locally from their own config data.
All zombies get the same payload, but onl
Re: (Score:2)
I'm assuming from the article that the configuration data they're talking about are things like MACs from the victim's NICs, serial numbers off of the memory SPD chips, and serial numbers from the SATA drives. If that's true, it would be easy enough to swap a memory stick out to avoid the problem, rather than trying to re-flash something.
If you've got that much knowledge about your potential for being hacked, you've probably already updated your systems with the latest anti-virus programs that would catch
one step closer to the world of Neal Stephenson (Score:3, Interesting)
In "The Diamond Age", sovereign powers and those with the means engage in (more or less) open conflict using nanomachines colloquially referred to as "mites". Particularly vicious "battles" in these conflicts manifest as smog-like pollution formed by mites of opposing factions destroying each other and leaving inert carcasses hanging in the air and settling over streets, building, etc. like a kind of artificial dust. Those unlucky enough to be caught outside during these times breath them in and have no
I got the solution (Score:5, Funny)
Re: (Score:2)
I think there is a button on the monitor
Re: (Score:2)
Overkill, you just need to use Gaussian elimination.
Re: (Score:2)
I know cockroaches and mice can become problematic as they commonly make them homes in nice warm computers with convenient openings, but do people really have a problem with 18th-century mathematician infestations?
Stop making malware (Score:1)
New State-Sponsored WINDOWS Malware. (Score:1)
Yes, it matters.
Would an article about a new APPICATION not reference what OS it runs on?
Re: (Score:1)
I demand a citation!! Where's your proof? Is it hiding under your tinfoil hat?
Re: (Score:2)
It's a do-it-yourself service: we give you the source code and you find the backdoors yourself.
Re: (Score:2)
Re: (Score:3)
I think we all assume massive malware failures on Microsoft. That's a statement, though you can read that as a troll/joke, which is kind of scary in it's own way - MS is so bad that the joke is you assume its the bad one.
Mac OSX is getting enough inroads to make it commercially viable to produce malware, but in a weird way I think people will skip it and move more quickly to Android/iOS.
Re: (Score:2)
Re:New State-Sponsored WINDOWS Malware. (Score:5, Funny)
Well according the helpful lads at 4chan, that folder is usually just filled with malware. They recommend deleting that folder. Seems like a pretty good idea.
Re:New State-Sponsored WINDOWS Malware. (Score:4, Insightful)
Actually, it doesn't. Had those plants been running Linux workstations, the malware would target Linux. Likely without breaking a sweat.
What? (Score:1)
Re:What? (Score:4, Interesting)
If the developers used pure assembler (which people don't any more *laments*), and scrubbed your code properly you could make it much harder to trace (but doing so in itself gives you clues about the creator.
Re:What? (Score:4, Informative)
While cleaning rootkits off servers and such, you'd be surprised. Half the time they go right out and say who made it and when. Usually with some silly message or statement, too.
Re: (Score:2)
Example silly message or statement: "Most people, I think, don't even know what a rootkit is, so why should they care about it?"
Since when (Score:5, Funny)
is a gaussian distribution news?
Re: (Score:3)
Well it's certainly not normal! Oh wait...
(disclaimer: I had to look it up :( )
Re: (Score:2)
well, the news is always skewed, so I guess Gaussian would be a big deal.
Re: (Score:2)
Identifying printed documents? (Score:2)
If the infections are targeted, perhaps the font is dropped to allow found printed documents to be linked to one of the targets?
Re: (Score:2)
I hadn't thought of that, that seems much more likely.
Re: (Score:3)
Interesting idea, but I bet the creators are much more cognizant of operational security. I doubt they surf the web from the development machines.
I'm guessing the development boxes are actually VMs inside their workstations. Think about it: would you really want to unit test a malware payload on a machine connected to the rest of your lab, or connected to the entire world?
Topic : Is this the new 'security' paradigm? (Score:1)
Is state-sponsored malware and having e-spies in all aspects of everything online...
Is this something that's going to 'solve the problem' or 'become the problem' would you say?
warhead?! (Score:2)
I believe the word you are searching for is "payload."
Re: (Score:2)
No way man, "warhead of unknown designation" sounds way more scarycool.
Re: (Score:2)
Or, one could realize that we only have so much space in our signatures for the HTML.
I would have used preview.tinyurl.com if I could. It got trunctated.
State Sponsored... (Score:1, Interesting)
Re: (Score:2)
You clearly missed the article in the New York Times...
Re: (Score:2)
If the US were actually interested in tracking money laundering the Bush Madministration wouldn't have withdrawn from the international anti-money laundering accord in February of 2001. Obam
Cipher Support For Arab Freedom (Score:1)
Instead of doing stupid comments here which only waste bandwidth, why don't we write some software to help the cause of Arab Freedom ? There is still no translation into Arabic for GPG !
I did something minor - a strong paper cipher which can secure combat radio messages: http://alkindicipher.wordpress.com
Wouldn't it be easier (Score:5, Funny)
Wouldn't it be easier to just send them all an e-mail: "Hello, I am Mrs. Kadafi, wife of the late ruler of Lybia. My husband left me with 300 millions USD in a Swiss account..."
When China strikes back (Score:1)
When China strikes back it will be a lot more interesting. Is US ready? If Israel with US think it's ok to infect computers in friendly and neutral countries they can't blame China on doing this too.
Re: (Score:1)
What do you mean "when"? China is already engaged in massive cyber-espionage with us.
Why can't they list the OS? (Score:1)
On virus announcements, why don't they ever mention vulnerable operating systems? Not all malware can infect all operating systems. It would be nice to know the specifics.
Then again, maybe Microsoft wouldn't like the bad PR.
May inspire a Windows exodus... (Score:5, Interesting)
Re: (Score:1)
I really doubt the NSA needs a back door adding. They probably have a list of 0days a mile long.
Clearly created by the US (Score:1)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Stupid thing to do. Because if I wanted to discredit another country, the most ingenious way would be to make it LOOK like they had done something, but that left subtle hints that it was them that created it.
Queue years of wrangling to get to the bottom of who exactly created it, while some other (unknown) entity who actually wrote it just walks away without suspicion.
We're talking international cyber-warfare here, aimed at nuclear processing plants. If I was making something like that, item #1 on my list
"Only one infection has been found in Iran" ..hmmm (Score:1)
Perhaps that one infection was the source of the other 2,446 infections?
Iran is a major player in Lebanon after all.
Internet terrorism (Score:2, Interesting)
Countries that release stuff like this into the wild are criminal rogue states. It's like dumping agent-orange not just on the jungles of Vietnam during war, but on the entire planet as a whole.
There are no borders on the Internet. What you release is not limited to your target and affects everyone.
One can only hope that the governments that released Flame, Stuxnet, and now this, become victims of their own weapons.
Yes, I do know who that likely means. I certainly hope it comes back to bite us like a tor
Re: (Score:2)
I regard them as healthy, because unless herd resistance to such things is built up by exposure, the herd will be less robust.
"One can only hope that the governments that released Flame, Stuxnet, and now this, become victims of their own weapons."
That would usefully coerce them to adopt better practices.
Re: (Score:1)
I find it interesting that stating facts as they exist on the ground is now "troll" on slashdot.
Re: (Score:2)
The behavior of Gauss as described in TFA is made to sound like "socially responsible malware".
By encrypting the payload with a key unique to a specific configuration, they are not providing that payload to anyone else. Not even Kaspersky can decrypt the payload, at least not until the target machine is identified. And by then it's probably too late.
Sure, they're still sending out malware, with USB exploits, root kits, and other bad stuff. It's not that much worse than what is widely available online toda
Re: (Score:2)
>It's not that much worse than what is widely available online today.
As if malware today is benign. It's sent out by criminals, and states that do this are therefore criminal states. Collective punishment is a war crime in real life because it is indiscriminate. This is collective punishment in e-space.
Why is malware being served up by a government any less criminal? Because it's a government? I'm not a teahadist, and I am not affected by this because I use linux, but I do object to people delibera