Stuxnet, Duqu & Conficker, a new generation of cyber weapons … even “without a father”

Cyber warfare expert John Bumgarner claims that the Stuxnet and Duqu virus have been active for much longer than previously suspected, he says that they are active in different variant since 2006.

Precisely he claims that the Stuxnet computer virus is linked to Conficker, a mysterious “worm” that surfaced in late 2008 and infected millions of PCs.

Conficker was used to open back doors into computers in Iran, then infect them with Stuxnet … “Conficker was a door kicker,”

Let remind that StuxNet has been discovered in 2010 and has been developed to attack Siemens PLCs whose use is widespread in the control systems of centrifuges for uranium enrichment.

Iran is still confronting the virus and the consequences of his attacks on the country’s critical infrastructures.  However Duqu has been more recent discovery and it apparently seems to share the genesis of Stuxnet, and it seems to be created for a different purpose, information steal. At least that would seem to be the main feature of Duqu observed in isolated instances of malware.

That said, the most alarming Duqu feature is its modularity, which would indicate that the malware has been designed with the intent to be scalable in its offensive possibilities. Today identity theft, tomorrow … unpredictable behaviour and targets?.

We are facing a new malware generation, modular and polymorphic, two features that make it particularly dangerous.

According Vitaly Kamluk, malware expert at Kaspersky Lab, his team found more than a dozen command-and-control servers operating during the past three years.  This demonstrate that more than a dozen different Duqu varients have been identified.  Many different servers were hacked all around the world (e.g.  in Vietnam, Germany, Singapore, Switzerland, India and UK). Most of the infected machines were running CentOS Linux and seems have been hacked by brute forcing attack to the root password. OpenSSH 4.3 0-day theory has been excluded.

Server ‘A’  was located in Vietnam and was used to control Duqu deployed in Iran. This was a Linux server running CentOS 5.5. Actually, all the Duqu C&C servers we have found so far run CentOS – version 5.4, 5.5 or 5.2. It is not known if this is just a coincidence or if the attackers have an affinity (exploit?) for CentOS 5.x.

The  attackers replace the stock OpenSSH 4.3 with version 5.8, and it has been possible to demonstrate it, but we don’t know real reason.

Server ‘B’ was located at a data center in Germany that belongs to a Bulgarian hosting company. It was used by the attackers to log in to the Vietnamese C&C. Evidence also seems to indicate it was used as a Duqu C&C in the distant past, although we couldn’t determine the exact Duqu variant which did so.

 

The Linux choice for the attacked system is quite strange.

A global cleanup operation took place on 20 October 2011 but the attackers wiped every single server which was used even in the distant past but unfortunately, the most interesting server, the C&C proxy in India, was cleaned only hours before the hosting company agreed to make an image.  The “real” Duqu mothership C&C server remains a mystery just like the attackers’ identities.

Here you are the principal milestones related to the agent history:

  • May 2006 – Engineers compile code for a component of Stuxnet that will allow them to attack programmable logic controllers, or PLCs, manufactured by Siemens of Germany. Iran’s nuclear program uses Siemens PLCs to control the gas centrifuges in its uranium enrichment facilities.
  • 2007 – Duqu, a data-stealing piece of malware, is deployed at targeted sites in Iran and some of its allies, including Sudan.
  • Late 2007 – Engineers write the code for the “digital bomb” component of Stuxnet, allowing those behind the attack to force the gas centrifuges to rotate at faster-than-normal speeds, which is what damaged the sensitive equipment when the cyber weapon was eventually deployed.
  • November 2008 – Conficker appears, starts to spread rapidly.
  • December 2008 – Actors behind Stuxnet start running www.mypremierfutbol.com, a website appealing to soccer fans that will eventually be used to cloak traffic traveling between machines infected with Stuxnet and the server controlling them.
  • January 2009 – They start running www.todaysfutbol.com, which will be used for the same purpose.
  • January 2009 – Spread of Conficker peaks and engineers continue writing code for key components of Stuxnet.
  • March 2009 – Conficker Variant C is deployed. This version will be used to deliver Stuxnet to Iran.
  • April 1, 2009 – Attackers begin to deploy Stuxnet to Iran on the 30th anniversary of the declaration of an Islamic republic in Iran.
  • January 2010 – Operators of Stuxnet accelerate program by adding new malware components that make it spread faster and also make it more dangerous.
  • March 2010 – Stuxnet operators add additional components to the malware to make it even more powerful.
  • June 2010 – Computer security firm VirusBlokAda identifies Stuxnet as a piece of malware after reviewing a sample that was found in Iran.
  • July 2010 – Cyber security blogger Brian Krebs breaks news of Stuxnet on his website.
  • November 2010 – Iran President Mahmoud Ahmadinejad discloses that a cyber weapon had damaged gas centrifuges at his nation’s uranium enrichment facility. “They did a bad thing. Fortunately our experts discovered that,” he said.

Conclusion

More I read of the results obtained by the research groups  more I am convinced that behind the development of such malware there is a government sponsorship.

We are facing with a new generation of weapons, real cyber weapons, silent and really offensive. -They are the result of the growing attention of many governments in cyberwarfare. Viruses are designed by teams of experts and their architecture are so complex that suggests a structured project aimed to surgery offensive.

Frankly speaking I do not understand why nobody have an idea about the possible paternity of the virus, whose genesis I think it is now well known to leading research groups. Probably the main reason is the important role of the Government who has created this virus and the political and economic power it has.

Nobody sees, nobody hears, nobody talks about it!

Pierluigi Paganini

References

http://www.reuters.com/article/2011/12/02/us-cybersecurity-iran-idUSTRE7B10AP20111202

https://www.securelist.com/en/blog/625/The_Mystery_of_Duqu_Part_Six_The_Command_and_Control_servers

http://www.reuters.com/article/2011/12/02/us-cyberattack-iran-idUSTRE7B10AV20111202

https://infosecisland.com/blogview/18229-Duqu-May-Actually-Be-An-Advanced-Cyber-Weapon.html

http://searchsecurity.techtarget.com/news/2240111909/Trojan-attackers-cleaned-their-tracks-well-analysis-finds

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 46

Security Affairs Malware newsletter includes a collection of the best articles and research on malware…

9 hours ago

Security Affairs newsletter Round 525 by Pierluigi Paganini – INTERNATIONAL EDITION

A new round of the weekly Securitythe weekly Security Affairs newsletterAffairs newsletter arrived! Every week…

9 hours ago

Operation ENDGAME disrupted global ransomware infrastructure

Operation ENDGAME dismantled key ransomware infrastructure, taking down 300 servers, 650 domains, and seizing €21.2M…

13 hours ago

Silent Ransom Group targeting law firms, the FBI warns

FBI warns Silent Ransom Group has targeted U.S. law firms for 2 years using callback…

1 day ago

Leader of Qakbot cybercrime network indicted in U.S. crackdown

The U.S. indicted Russian Rustam Gallyamov for leading the Qakbot botnet, which infected 700K+ devices…

1 day ago

Operation RapTor led to the arrest of 270 dark web vendors and buyers

Law enforcement operation codenamed 'Operation RapTor' led to the arrest of 270 dark web vendors…

3 days ago