Saturday, June 13, 2015

Duqu Cyber Attack - Zero-Day, Predecessors and a Silver Lining

duqu cyber attack


In light of Sir Christopher Lee’s passing, it seems only fitting that we make a nod in his general direction to talk about the most recent attack by our good friend: Duqu.  That’s right, HackerAttackers – There has been another Duqu cyber attack. Duqu is back, and it’s breaking out the big guns with 2.0.  Like its apparent namesake (though, personally, Dooku looks a lot more villainy), Duqu 2.0 is a master of disguise, infiltration and covering its tracks.  We’ve spoken before about the nature of cyber warfare in the digital age, and Duqu 2.0 is a prime example of the evolution of this threat.  Threats such as the Stuxnet virus, and Flame are pushing the envelope for what we consider traditional spycraft and covert war.  The Duqu cyber attack is the most recent, home-based instance of cyber warfare to point out the need for stronger security, and above all, a more penetrating awareness of the threats of our digital age. 



The Legacy of the Duqu Cyber Attack – Predecessors and Mentors


I’ve personally noted this before, but Star Wars is rife with real-world parallels and lessons to be learned, even when it comes to authentication and information security.  There is something to be said about the pre-Disney era of science fiction and fantasy and how it was able to resonate with so many individuals.  There are more similarities to this attack than simply the phonetics of a name: Duqu 2.0 is an advanced threat working in a manner just like the Sith lords we’ve come to both love and hate. 

Courtesy of: Secmeme.com


The most obvious origin story for Duqu 2.0 goes back further than it’s initial version. In fact, they didn’t even have the same name  –Stuxnet. If you haven’t seen the news or the reviews about the Stuxnet attacks, you should check it out, but here are some of the highlights.

·      Physically damaged hardware
·      Targeted Iranian Nuclear Facilities
·      Used multiple origin points
·      Led to the discovery of a print-spooler zero-day exploit
·      Illustrated the first major dedication towards a digital manner of attack

So as you can see, the Duqu cyber attack story has a complex and very sordid beginning.  There is a reason that publications such as Wired.com hail Stuxnet as the ‘World’s first digital weapon;’ not only did it make one of the first major digital attacks for obvious political motivations, it also illustrated the various methods digital attackers can use to spread their weapon of choice.  Stuxnet spread like wildfire thanks to a ‘patient zero’ style attack – turning major companies into carriers that multiplied rapidly, increasing the chance of infecting the target exponentially.  Think every recent zombie movie – only this was localized within the cyber world. 

From this origin – it isn’t hard to see where Duqu got its inspiration.

Kaspersky Labs is kind of the lead on Stuxnet and Duqu; and for good reason – they have put in a lot of time and resources, keeping the public in the loop the entire way.  Through their SecureList blog, Kaspersky illustrates the connection between Duqu and Stuxnet in surprising detail.  You can check it out Here.  

Stuxnet took the world by storm in early 2010.  The initial Duqu cyber attack happened barely a year later in 2011, with all of the pomp and circumstance you would expect. 

Duqu isn’t just guessed at being related to Stuxnet – thanks to some very in-depth analysis by Kaspersky on the Duqu cyber attack, it is clear now that the two digital weapons were created by the same people.  Both weapons illustrate multiple instances of similar code and processes that show their origins quite clearly.  The way Kaspersky writers put it, “Duqu and Stuxnet are like Windows and Office. Both are from Microsoft, although different people might have worked on them.” 

So clearly, some people really do want to watch the world burn. 



Like the character of the recently deceased Sir Christopher Lee, Duqu was an informational gathering machine.  It was incredibly difficult to detect once it infiltrated the system: it was constructed specifically to target and control the certificates that handled that process.  Its predecessor may have been intended primarily to hinder or destroy physical machinery, but Duqu was sent out to hide in plain sight – gathering every single byte of information it could get its digital hands on.

Duqu was the file that convinced the system that it was safe, just to steal everything when the system wasn’t looking.   Something tells me that Palpatine would be extraordinarily proud. 

Like something from a Mission Impossible film, the Duqu cyber attack instances ceased and Duqu went silent in 2012.  It didn’t stay that way.

Duqu 2.0 – The Second Coming


Once again, Iran seems to be the prominent target for the Duqu cyber attack scene.  The majority of Duqu 2.0 infections are linked back to events relating to the Iranian nuclear negotiations, according to Kaspersky’s SecureList blog.  Interestingly enough, the new variation was only detected because the attackers decided to deploy it against Kaspersky directly.

Though having no relation to Iran or their nuclear program, Kaspersky is a major player in the APT game, and played a major role in the cessation of the initial run of Duqu cyber attacks.  Given that one of the original Duqu cyber attack goals was to provide false certification to bypass security checks, it doesn’t seem too shocking that Duqu 2.0 would attempt to sink its teeth into the very corporation that works to detect false security certificates, and brought about their initial downfall.

It seems, however, that this particular Duqu cyber attack bit off more than it can chew.


Duqu 2.0 attacked in waves.  Much like actual warfare, the initial phase spent much effort on undetectable infiltration (Read: infection).  Using a previously unknown zero-day vulnerability (CVE-2014-4148), Duqu was able to mirror the attack used in the original Duqu cyber attack.  From this stage, Duqu launches a dual front attack: observing and infecting the remainder of the computers on the network.  In this particular stage, Duqu 2.0 made use of yet another zero-day vulnerability (CVE-2014-6324) – allowing unprivileged domain users to elevate their credentials to administrator levels.  From here, it was a relatively simple matter to spread the infection remotely throughout the domain. 

Note that since this discovery, both vulnerabilities have been patched.

If you would like to learn more about the anatomy of the virus, and how it relates to the original Duqu cyber attack, check out the Kaspersky Technical Paper.

Silver Linings – a Light to Dull the Dark Side.


Given the nuclear origins of this series of cyber attacks, there is naturally a sense of fear associated with the news.  The Duqu cyber attack (along with Stuxnet) truly illustrates the importance of constantly observing and safeguarding your network – and the dedication which attackers will employ to discover new vulnerabilities.  It is this sort of attack that illustrates not only the danger of serious black hat hackers, but also the importance of white hat hackers to assist with building an appropriate defense. 

In this case, Kaspersky is the group of white hat hackers, keeping the public in the loop in order to increase protection worldwide.  I do not think it was a coincidence that the C&C servers hosting each instance of Duqu have since been taken offline. 

As a society, we are reaching towards a supremely digital era at an increasingly rapid pace.  We go so far as to give over pieces of ourselves to access more digital content and usability in order to better benefit our daily lives.  The further we delve down this rabbit hole, the more danger we are surrounded by.  The Duqu cyber attack is an example of a terrible use of the digital age, for sure, but it also exemplifies a certain silver lining, or Bright Side.

With each new attack, and each new successful defense, we learn more about the vulnerabilities inherent in our own creations, and how better to rectify those mistakes in the future.  One need only look to what Deloitte managed with its Mock Cyber attack – Learning from previous attacks and the fallout of each, the company was able to better train all employees (as opposed to just members of the IT field) in the art of defending against and responding to breaches and attacks. 


Each cyber attack is a trial by fire that our society plows through, emerging singed but whole – more resistant than ever before.  Yes, Count Dooku turned to the Dark Side and led Anakin down the path to become Darth Vader, but those events illustrated the faults in the Jedi Code, paving the way to a brighter, stronger future.  The Duqu cyber attack is definitely a black mark of the digital age, as was Stuxnet before it.  With the help of security experts and an ever-expanding knowledge of the dangers of the digital world, we take down these threats one by one, growing stronger in our defenses every day. 

No comments:

Post a Comment