Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Security IT

New State-Sponsored Malware "Gauss" Making the Rounds 106

EliSowash writes "A newly uncovered espionage tool, apparently designed by the same people behind the state-sponsored Flame malware that infiltrated machines in Iran, has been found infecting systems in other countries in the Middle East, according to Kaspersky researchers. Gauss is a nation-state-sponsored banking Trojan which carries a warhead of unknown designation. Besides stealing various kinds of data from infected Windows machines, it also includes an unknown, encrypted payload which is activated on certain specific system configurations. Just like Duqu was based on the 'Tilded' platform on which Stuxnet was developed, Gauss is based on the 'Flame' platform."
This discussion has been archived. No new comments can be posted.

New State-Sponsored Malware "Gauss" Making the Rounds

Comments Filter:
  • Names (Score:1, Funny)

    by Anonymous Coward

    I want to name the next Malware Browncoat, because that is what Mal wears.

  • by MRe_nl ( 306212 ) on Thursday August 09, 2012 @01:40PM (#40935575)

    Governments releasing digital weapons on the internet. Thanks for the R&D!
    COPY/PASTE.

    • by zlives ( 2009072 )

      yes but when you use it you are a threat to national security/terrorist....
      hmm wonder if copy/paste can be declared a wmd

    • by antonymous ( 828776 ) on Thursday August 09, 2012 @02:23PM (#40936373)
      I know it's bad form to RTFA, but here's the part where they talk about their current inability to properly decrypt the payload:

      The malware uses that configuration to generate a key to unlock the payload and unleash it. Once it finds the configuration itâ(TM)s looking for, it uses that configuration data to perform 10,000 iterations of MD5 to generate a 128-bit RC4 key, which is then used to decrypt the payload. âoeUnless you meet these specific requirements, youâ(TM)re not going to generate the right key to decrypt it,â Schoewenberg says.

      • by ceoyoyo ( 59147 )

        Cool. So it just tries whatever configuration it finds itself on and, if it decrypts, bam. That's probably a useful little trick to remember.

        • by Lehk228 ( 705449 )
          Nifty trick, but overall near useless, except in cases where sucess is much less important than deniability (sp?). Fatal flaw is that the scan of configuration is plaintext and so potential targets can reflash their systems to read back different configs slightly (append Penis" to version strings, etc. And immunize themselves from the secret payload
          • Re: (Score:2, Interesting)

            by ceoyoyo ( 59147 )

            It takes time to develop and test an update and flash a system (not to mention money). Gauss is certainly time-limited, but that might be a feature. If you wanted to shut down Iranian centrifuges, for example, you could just send out a copy specific to those configurations. The Iranian centrifuge operators get attacked, realized they're the target (but nobody believes them), and spend time and money flashing their systems. Next week, Gauss2 comes out, same as last time but with "Penis" appended to the v

          • But something doesn't add up there... If they can reverse engineer and spoof the configuration, why are they unable to decrypt the payload?

            I was under the impression that if a system has the knowledge to decrypt something, and you have access to that system, you will be able to get to the protected data. If what you say is true, what else is preventing them from busting the crypto?

            This certainly has my curiosity bone tickled.

            • Guessing they haven't figured out what that configuration is.

            • by plover ( 150551 ) *

              They can't decrypt it today because Kaspersky doesn't know who the target is, was, or what their configuration looks like.

              Let's think about its predecessor, Stuxnet, for a minute. Stuxnet's authors made several big security mistakes. First they gave away a free copy of "How to attack Iranian nuclear centrifuge systems via SCADA vulnerabilities" to every script kiddy on the planet; plus, they essentially told Iran "it's you." They seriously underestimated the ability of various groups of people to disass

              • Ahh, so Gauss doesn't carry the key itself, it gets it from the CC server, and only when the configuration matches a specific pattern (known only by the server). Very interesting indeed. Thank you for the detailed explanation!
                • by plover ( 150551 ) *

                  Close, but not quite.

                  Some time a while ago, Gauss surveyed every victim's computer, reporting their config data to the CC servers.

                  The attackers identified a specific victim, and used that victim's config data to generate a key. The payload was then encrypted by the attackers with that particular key, and then delivered to every active Gauss zombie by the CC server.

                  The Gauss zombies don't ever carry the key, they always generate it locally from their own config data.

                  All zombies get the same payload, but onl

          • by plover ( 150551 ) *

            I'm assuming from the article that the configuration data they're talking about are things like MACs from the victim's NICs, serial numbers off of the memory SPD chips, and serial numbers from the SATA drives. If that's true, it would be easy enough to swap a memory stick out to avoid the problem, rather than trying to re-flash something.

            If you've got that much knowledge about your potential for being hacked, you've probably already updated your systems with the latest anti-virus programs that would catch

      • In "The Diamond Age", sovereign powers and those with the means engage in (more or less) open conflict using nanomachines colloquially referred to as "mites". Particularly vicious "battles" in these conflicts manifest as smog-like pollution formed by mites of opposing factions destroying each other and leaving inert carcasses hanging in the air and settling over streets, building, etc. like a kind of artificial dust. Those unlucky enough to be caught outside during these times breath them in and have no

  • by courteaudotbiz ( 1191083 ) on Thursday August 09, 2012 @01:47PM (#40935723) Homepage
    Just De-Gauss the infected hard drive
    • I think there is a button on the monitor

    • Overkill, you just need to use Gaussian elimination.

    • Just De-Gauss the infected hard drive

      I know cockroaches and mice can become problematic as they commonly make them homes in nice warm computers with convenient openings, but do people really have a problem with 18th-century mathematician infestations?

  • We all know who you are... Just STOP.
  • Yes, it matters.

    Would an article about a new APPICATION not reference what OS it runs on?

  • How do these researchers determine where the code was written? I never understood that.
    • Re:What? (Score:4, Interesting)

      by FalconZero ( 607567 ) <FalconZero@Gmai[ ]om ['l.c' in gap]> on Thursday August 09, 2012 @02:29PM (#40936461)
      I think it's a mixed bag of things. Unmangled variables would be a great help - could tell you the native language of the developers. Code style can give hints as well - you can compare the style of code with the style of a known sample to give hints. Machine code structure can tell you which compiler was used (which gives you more hints).

      If the developers used pure assembler (which people don't any more *laments*), and scrubbed your code properly you could make it much harder to trace (but doing so in itself gives you clues about the creator.
    • Re:What? (Score:4, Informative)

      by X0563511 ( 793323 ) on Thursday August 09, 2012 @02:33PM (#40936533) Homepage Journal

      While cleaning rootkits off servers and such, you'd be surprised. Half the time they go right out and say who made it and when. Usually with some silly message or statement, too.

      • Example silly message or statement: "Most people, I think, don't even know what a rootkit is, so why should they care about it?"

  • Since when (Score:5, Funny)

    by Black Parrot ( 19622 ) on Thursday August 09, 2012 @02:04PM (#40936097)

    is a gaussian distribution news?

  • If the infections are targeted, perhaps the font is dropped to allow found printed documents to be linked to one of the targets?

  • Is state-sponsored malware and having e-spies in all aspects of everything online...

    Is this something that's going to 'solve the problem' or 'become the problem' would you say?

  • I believe the word you are searching for is "payload."

    • No way man, "warhead of unknown designation" sounds way more scarycool.

  • State Sponsored... (Score:1, Interesting)

    by efensive ( 2697763 )
    It's amusing to see how much the term "State Sponsored" is thrown around regarding these variants. Sooner or later, everything will be labeled as such to the point where truly "state sponsored" won't even matter. Further disturbing is the annoying mechanisms in which companies like Kaspersky wildly and broadly word their articles often allowing for insane inferences to be made. For example, floating around is news that the US did this to follow the money trail for terrorists. Really? Because a national secu
    • You clearly missed the article in the New York Times...

    • by cusco ( 717999 )
      PROMIS??? A 1980s database management tool? Sure, it was as high-tech as it came at the time, but there are a ton of free and open source tools out there that have capabilities that the authors of PROMIS never dreamed of, and the custom tools that a competent team of developers could write today far outstrip those.

      If the US were actually interested in tracking money laundering the Bush Madministration wouldn't have withdrawn from the international anti-money laundering accord in February of 2001. Obam
  • by Anonymous Coward

    Instead of doing stupid comments here which only waste bandwidth, why don't we write some software to help the cause of Arab Freedom ? There is still no translation into Arabic for GPG !

    I did something minor - a strong paper cipher which can secure combat radio messages: http://alkindicipher.wordpress.com

  • by HexaByte ( 817350 ) on Thursday August 09, 2012 @03:03PM (#40937023)

    Wouldn't it be easier to just send them all an e-mail: "Hello, I am Mrs. Kadafi, wife of the late ruler of Lybia. My husband left me with 300 millions USD in a Swiss account..."

  • by Anonymous Coward

    When China strikes back it will be a lot more interesting. Is US ready? If Israel with US think it's ok to infect computers in friendly and neutral countries they can't blame China on doing this too.

    • by Grave ( 8234 )

      What do you mean "when"? China is already engaged in massive cyber-espionage with us.

  • On virus announcements, why don't they ever mention vulnerable operating systems? Not all malware can infect all operating systems. It would be nice to know the specifics.

    Then again, maybe Microsoft wouldn't like the bad PR.

  • by Kazoo the Clown ( 644526 ) on Thursday August 09, 2012 @04:26PM (#40938221)
    If these events cause mass flight from Microsoft products, the NSA or whoever wrote the darn thing might want to think twice before they go to Microsoft asking for any back doors or any other favors, I suspect Ballmer won't take too kindly to the idea of exploiting Windows in the name of national security if it takes a big ding out of their bottom line...
    • by Anonymous Coward

      I really doubt the NSA needs a back door adding. They probably have a list of 0days a mile long.

  • Can't we just say sponsored by the US instead of acting like we don't know who created this?
    • It could be the Israelis, they created Trusteer Rapport, so they have previous here.
    • by tomhath ( 637240 )
      Because there's absolutely no evidence that it's anything more than a crude copy/edit of stuxnet or flame. The author speculates because parts were copied, but admits it's not as sophisticated as either.
    • by ledow ( 319597 )

      Stupid thing to do. Because if I wanted to discredit another country, the most ingenious way would be to make it LOOK like they had done something, but that left subtle hints that it was them that created it.

      Queue years of wrangling to get to the bottom of who exactly created it, while some other (unknown) entity who actually wrote it just walks away without suspicion.

      We're talking international cyber-warfare here, aimed at nuclear processing plants. If I was making something like that, item #1 on my list

  • Aside from 1,660 infections in Lebanon, 482 are in Israel and 261 are in the Palestinain territories, and 43 are in the U.S. Only one infection has been found in Iran.

    Perhaps that one infection was the source of the other 2,446 infections?

    Iran is a major player in Lebanon after all.

  • Internet terrorism (Score:2, Interesting)

    by bmo ( 77928 )

    Countries that release stuff like this into the wild are criminal rogue states. It's like dumping agent-orange not just on the jungles of Vietnam during war, but on the entire planet as a whole.

    There are no borders on the Internet. What you release is not limited to your target and affects everyone.

    One can only hope that the governments that released Flame, Stuxnet, and now this, become victims of their own weapons.

    Yes, I do know who that likely means. I certainly hope it comes back to bite us like a tor

    • I regard them as healthy, because unless herd resistance to such things is built up by exposure, the herd will be less robust.

      "One can only hope that the governments that released Flame, Stuxnet, and now this, become victims of their own weapons."

      That would usefully coerce them to adopt better practices.

    • by bmo ( 77928 )

      I find it interesting that stating facts as they exist on the ground is now "troll" on slashdot.

    • by plover ( 150551 ) *

      The behavior of Gauss as described in TFA is made to sound like "socially responsible malware".

      By encrypting the payload with a key unique to a specific configuration, they are not providing that payload to anyone else. Not even Kaspersky can decrypt the payload, at least not until the target machine is identified. And by then it's probably too late.

      Sure, they're still sending out malware, with USB exploits, root kits, and other bad stuff. It's not that much worse than what is widely available online toda

      • by bmo ( 77928 )

        >It's not that much worse than what is widely available online today.

        As if malware today is benign. It's sent out by criminals, and states that do this are therefore criminal states. Collective punishment is a war crime in real life because it is indiscriminate. This is collective punishment in e-space.

        Why is malware being served up by a government any less criminal? Because it's a government? I'm not a teahadist, and I am not affected by this because I use linux, but I do object to people delibera

"The vast majority of successful major crimes against property are perpetrated by individuals abusing positions of trust." -- Lawrence Dalzell

Working...