Cyberattack targeted Iran nuclear talks venues: Kaspersky Lab

RESTRICTIONS: NONE
For story suggestions please contact [email protected]

Kaspersky Lab say they have uncovered a sophisticated malware infection in venues that hosted high-level discussions surrounding Iran’s nuclear programme.

Duqu 2.0, an advanced espionage virus with links to Israel, is thought to have been used in a cyberattack on hotels where the P5+1 talks took place in Europe.

Kaspersky Lab explained that the malware exploits zero-day vulnerabilities. These attacks occur the same day a software weakness is discovered and before its creators can make a fix available via an update.

The malware modifies system rules, allowing it to spread within a network through files commonly used to install software on remote computers. Additionally, the malware doesn’t change any disk files or system settings, making it difficult to trace.

According to the Wall Street Journal, the malware contained modules designed to control infected computers and compress video feeds, possibly from surveillance cameras.

Additionally, the malware targets communication networks, including Wi-Fi and phones, allowing hackers to listen in on connected users and steal sensitive information.

RUNDOWN SHOWS:
1. Hacker targeting hotel
2. Explanation of zero-day vulnerabilities
3. Malware spreading throughout a network
4. Detectability of malware
5. Capabilities of malware
6. Hacker stealing files and listening in on phone conversations

VOICEOVER (in English):
“An advanced spy malware with links to Israel is thought to have been used in a cyberattack on hotels hosting the P5+1 talks in Europe.”

“Kaspersky Lab says the malware exploits zero-day vulnerabilities. These attacks happen the same day a software weakness is discovered and before its creators can make a fix.”

“Once inside, the malware modifies system rules, allowing it to spread within a network through files commonly used to install software on remote computers.”

“Dubbed Duqu 2.0, the malware doesn’t change any preferences or system settings, making it difficult to trace.”

“According to the Wall Street Journal, the malware contained modules designed to control infected computers and compress video feeds, possibly from surveillance cameras.”

“As well as this, it targets communication networks, including Wi-Fi and phones, allowing hackers to listen in on connected users and steal sensitive information.”

SOURCES: Wall Street Journal, Kaspersky, Guardian

http://www.wsj.com/articles/spy-virus-linked-to-israel-targeted-hotels-used-for-iran-nuclear-talks-1433937601
http://www.kaspersky.com/about/news/virus/2015/Duqu-is-back
http://www.theguardian.com/technology/2015/jun/11/duqu-20-computer-virus-with-traces-of-israeli-code-was-used-to-hack-iran-talks