Get 40% Off
👀 👁 🧿 All eyes on Biogen, up +4,56% after posting earnings. Our AI picked it in March 2024.
Which stocks will surge next?
Unlock AI-picked Stocks

Kaspersky says Iran talks spyware masqueraded under Foxconn name

Published 06/15/2015, 02:32 PM
Updated 06/15/2015, 02:34 PM
© Reuters. A motorcyclist rides past the entrance of the headquarters of Hon Hai, which is also known by its trading name Foxconn, in Tucheng, New Taipei city

By Eric Auchard and Joseph Menn

FRANKFURT/SAN FRANCISCO (Reuters) - Further research into the sophisticated computer virus used to hack into hotels where the Iran nuclear talks took place has found it took advantage of digital credentials stolen from the world's top contract electronics maker Foxconn.

Russian security company Kaspersky Lab said on Monday that researchers learned the Duqu 2.0 virus had redirected computer traffic by using a legitimate digital certificate from Taiwan's Hon Hai, also known as Foxconn.

Foxconn customers have included many of the world's biggest electronic makers, including Apple (NASDAQ:AAPL), Blackberry (TO:BB), Google (NASDAQ:GOOGL), Huawei [HWT.UL] and Microsoft.

Kaspersky revealed its initial findings in a report last week in which it said it found the virus in conferencing equipment at three European hotels used in talks involving Iran and six world powers, among other targets.

Digital certificates are the credentials which identify legitimate computers on a network. They act as the basis of e-commerce and other largely automated transactions on the Web.

In recent years, cyberspies have begun to exploit stolen certificates to trick machines into thinking malicious software comes from legitimate computers, an escalation posing a grave threat to business done over the Internet, security experts say.

TARGETED ATTACKS

The "P5+1" group of six world powers have been negotiating with Iran on curbs to its disputed nuclear program - the United States, Russia, China, Britain, France and Germany.

The on-again, off-again series of talks to reach a comprehensive nuclear deal with Iran have been held in Geneva, Lausanne, Montreux, Munich and Vienna since last year.

3rd party Ad. Not an offer or recommendation by Investing.com. See disclosure here or remove ads .

Both Moscow-based Kaspersky and U.S. security company Symantec Corp (NASDAQ:SYMC) said the virus shared some programming with previously discovered espionage software called Duqu, which security experts believe to have been developed by Israelis.

Israel, which has strongly opposed the powers' diplomatic opening to its arch-enemy Iran, denied any connection with the virus. In February, the United States accused Israel of using selective leaks from the talks to distort the U.S. position.

The West suspects Iran wants to develop a nuclear weapons capability from its enrichment of uranium. Iran says it wants nuclear energy only for electricity and medical isotopes.

Symantec and Kaspersky analysts have said there was overlap between Duqu and Stuxnet, a U.S.-Israeli project that sabotaged Iran's nuclear program in 2009-10 by destroying a thousand or more centrifuges that were enriching uranium.

The Stuxnet virus took advantage of stolen digital certificates from two other major Taiwanese companies, JMicron Technology Corp and Realtek Semiconductor Corp, Kaspersky said in a report it published in 2010.

"Duqu attackers are the only ones who have access to these certificates, which strengthens the theory they hacked the hardware manufacturers in order to get these certificates," Kaspersky said in a summary of its report on Monday.

Kaspersky said it had notified Foxconn of the stolen credentials. Foxconn was not immediately available to comment on steps it has taken to secure its systems.

Last week, Kaspersky said Duqu 2.0 had evolved from the earlier Duqu, which had been deployed against unidentified targets for years before it was discovered in 2011.

3rd party Ad. Not an offer or recommendation by Investing.com. See disclosure here or remove ads .

It said Duqu 2.0 used three previously unknown flaws in Microsoft Corp (NASDAQ:MSFT) software to infect machines, for which the software giant subsequently released patches to fix. The attack left almost no traces.

Latest comments

Risk Disclosure: Trading in financial instruments and/or cryptocurrencies involves high risks including the risk of losing some, or all, of your investment amount, and may not be suitable for all investors. Prices of cryptocurrencies are extremely volatile and may be affected by external factors such as financial, regulatory or political events. Trading on margin increases the financial risks.
Before deciding to trade in financial instrument or cryptocurrencies you should be fully informed of the risks and costs associated with trading the financial markets, carefully consider your investment objectives, level of experience, and risk appetite, and seek professional advice where needed.
Fusion Media would like to remind you that the data contained in this website is not necessarily real-time nor accurate. The data and prices on the website are not necessarily provided by any market or exchange, but may be provided by market makers, and so prices may not be accurate and may differ from the actual price at any given market, meaning prices are indicative and not appropriate for trading purposes. Fusion Media and any provider of the data contained in this website will not accept liability for any loss or damage as a result of your trading, or your reliance on the information contained within this website.
It is prohibited to use, store, reproduce, display, modify, transmit or distribute the data contained in this website without the explicit prior written permission of Fusion Media and/or the data provider. All intellectual property rights are reserved by the providers and/or the exchange providing the data contained in this website.
Fusion Media may be compensated by the advertisers that appear on the website, based on your interaction with the advertisements or advertisers.
© 2007-2024 - Fusion Media Limited. All Rights Reserved.