John Bumgarner, a cyber warfare expert who is chief technology officer of the US Cyber Consequences Unit, a non-profit group that studies the impact of cyber threats, holds a notebook computer while posing for a portrait in Charlotte December 1, 2011. A cyber warfare expert claims he has linked the Stuxnet computer virus that attacked Iran’s nuclear program in 2010 to Conficker, a mysterious worm that surfaced in late 2008 and infected millions of PCs. Conficker was used to open back doors into computers in Iran, then infect them with Stuxnet, according to research Bumgarner, a retired US Army special-operations veteran and former intelligence officer. – Reuters Photo

The Stuxnet virus that last year damaged Iran’s nuclear program was likely one of at least five cyber weapons developed on a single platform whose roots trace back to 2007, according to new research from Russian computer security firm Kaspersky Lab.

Security experts widely believe that the United States and Israel were behind Stuxnet, though the two nations have officially declined to comment on the matter.

A Pentagon spokesman on Wednesday declined comment on Kaspersky’s research, which did not address who was behind Stuxnet.

Stuxnet has already been linked to another virus, the Duqu data-stealing trojan, but Kaspersky’s research suggests the cyber weapons program that targeted Iran may be far more sophisticated than previously known.

Kaspersky’s director of global research & analysis, Costin Raiu, told Reuters on Wednesday that his team has gathered evidence that shows the same platform that was used to build Stuxnet and Duqu was also used to create at least three other pieces of malware.

Raiu said the platform is comprised of a group of compatible software modules designed to fit together, each with different functions. Its developers can build new cyber weapons by simply adding and removing modules.

“It’s like a Lego set. You can assemble the components into anything: a robot or a house or a tank,” he said.

Kaspersky named the platform “Tilded” because many of the files in Duqu and Stuxnet have names beginning with the tilde symbol “ “ and the letter “d.”

Researchers with Kaspersky have not found any new types of malware built on the Tilded platform, Raiu said, but they are fairly certain that they exist because shared components of Stuxnet and Duqu appear to be searching for their kin.

When a machine becomes infected with Duqu or Stuxnet, the shared components on the platform search for two unique registry keys on the PC linked to Duqu and Stuxnet that are then used to load the main piece of malware onto the computer, he said.

Kaspersky recently discovered new shared components that search for at least three other unique registry keys, which suggests that the developers of Stuxnet and Duqu also built at least three other pieces of malware using the same platform, he added.

Those modules handle tasks including delivering the malware to a PC, installing it, communicating with its operators, stealing data and replicating itself.

Makers of anti-virus software including Kaspersky, US firm Symantec Corp and Japan’s Trend Micro Inc have already incorporated technology into their products to protect computers from getting infected with Stuxnet and Duqu.

Yet it would be relatively easy for the developers of those highly sophisticated viruses to create other weapons that can evade detection by those anti-virus programs by the modules in the Tilded platform, he said.

Kaspersky believes that Tilded traces back to at least 2007 because specific code installed by Duqu was compiled from a device running a Windows operating system on Aug. 31, 2007.

Opinion

Editorial

Short-changed?
Updated 24 Nov, 2024

Short-changed?

As nations continue to argue, the international community must recognise that climate finance is not merely about numbers.
Overblown ‘threat’
24 Nov, 2024

Overblown ‘threat’

ON the eve of the PTI’s ‘do or die’ protest in the federal capital, there seemed to be little evidence of the...
Exclusive politics
24 Nov, 2024

Exclusive politics

THERE has been a gradual erasure of the voices of most marginalised groups from Pakistan’s mainstream political...
Counterterrorism plan
Updated 23 Nov, 2024

Counterterrorism plan

Lacunae in our counterterrorism efforts need to be plugged quickly.
Bullish stock market
23 Nov, 2024

Bullish stock market

NORMALLY, stock markets rise gradually. In recent months, however, Pakistan’s stock market has soared to one ...
Political misstep
Updated 23 Nov, 2024

Political misstep

To drag a critical ally like Saudi Arabia into unfounded conspiracies is detrimental to Pakistan’s foreign policy.