Microsoft Windows vulnerability exploited by Duqu
More information on the mystery that is Duqu emerges, adding more weight to the claim the malware was created by Stuxnet's authors.

The Duqu malware, believed by some to be a product of the Stuxnet creators, used a Microsoft Windows flaw to exploit targets' systems.
Duqu was uncovered by Hungarian security company CrySys Labs last month and, as it used much of the same code as Stuxnet, was thought to have been forged by the same hands.
Security researchers were previously at a loss as to how the Duqu malware was able to find its way onto people's computers, but now the missing link has been found.
"The installer file is a Microsoft Word document (.doc) that exploits a previously unknown kernel vulnerability that allows code execution," Symantec explained in a blog post.
"When the file is opened, malicious code executes and installs the main Duqu binaries."
Thanks to the shell code, Duqu was only be installed during an eight-day period in August, the security giant reported, noting that attackers could command Duqu to spread to other machines within an organisation.
In some cases Duqu was seen using a peer-to-peer network in order to talk with other infected machines before communicating with the attackers' command and control centre.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
"Consequently, Duqu creates a bridge between the network's internal servers and the C&C server. This allowed the attackers to access Duqu infections in secure zones with the help of computers outside the secure zone being used as proxies," Symantec said.
Microsoft is currently working on a patch for the vulnerability, believed by some to be in win32k.sys, but a fix is not expected in November's Patch Tuesday.
According to Kaspersky, the new evidence adds further weight to suggestions that the Stuxnet creators really were behind Duqu.
"The detection of the dropper and the route used to penetrate the system (a targeted attack against a specific victim conducted via email) proves our theory that the Duqu attacks are directed against a very small number of victims and in each case, they can employ unique sets of files," Kaspersky said in its own blog post.
"To infect other computers in the network, Duqu seems to be using scheduled jobs, a technique that we've also seen in Stuxnet and is a preferred choice of APTs. These, together with other previously known details, reinforce the theory that Stuxnet and Duqu were created by the same people."
The Russian security firm said it had detected three victims in Sudan and four in Iran. Symantec said six "possible organisations" in eight countries, including the UK, have confirmed infections.
Tom Brewster is currently an associate editor at Forbes and an award-winning journalist who covers cyber security, surveillance, and privacy. Starting his career at ITPro as a staff writer and working up to a senior staff writer role, Tom has been covering the tech industry for more than ten years and is considered one of the leading journalists in his specialism.
He is a proud alum of the University of Sheffield where he secured an undergraduate degree in English Literature before undertaking a certification from General Assembly in web development.
-
CISA issues warning in wake of Oracle cloud credentials leak
News The security agency has published guidance for enterprises at risk
By Ross Kelly
-
Reports: White House mulling DeepSeek ban amid investigation
News Nvidia is caught up in US-China AI battle, but Huang still visits DeepSeek in Beijing
By Nicole Kobie
-
2022 Public Sector Identity Index Report
Whitepaper UK Report
By ITPro
-
UK, US condemn Iran for ‘unprecedented’ cyber attack against Albania
News The Balkan nation has cut ties with Iran following the hack, which took down national infrastructure and exposed government information
By Rory Bathgate
-
Majority of UK's top business leaders are failing to manage supply chain security risks
News New findings from a DCMS review have sparked concern in government which could see new laws introduced to protect Britain's digital supply chains
By Connor Jones
-
Department of Health and Human Services must improve cyber security info sharing
News GAO report finds HHS has made progress, but better coordination would increase health care security
By Rene Millman
-
NHS gets £21m to boost cyber defences after WannaCry ransomware
News Government funding comes hand-in-hand with stricter data security measures
By Joe Curtis
-
Queen's Speech: IT industry reacts to tech pledges
News Firms address the Tories' data protection and digital charter aims
By Joe Curtis
-
Foreign state DDoS attack 'may have crashed Brexit voting site'
News Committee warns against cyber interference in aftermath of EU referendum vote
By Joe Curtis
-
The government needs to abandon its war on WhatsApp
Opinion Encryption might seem like an easy target, but mess with it at your peril
By Adam Shepherd