Link spotted between Wiper virus and Stuxnet, Duqu

Share this article:

Researchers now believe the mysterious Wiper virus, which targeted Iran's oil ministry in April by destroying files and erasing data, may be a cousin of Stuxnet and Duqu.

On Wednesday, Kaspersky Lab released a blog post detailing new information about Wiper, a challenging feat as the malware leaves virtually nothing behind to be analyzed.

Roel Schouwenberg, senior researcher at Kaspersky Lab, told on Wednesday that a pattern was discovered regarding the way Wiper vanquished information in its path.

“We found that Wiper tries to destroy files with a .pnf extension first, which made us think back to Stuxnet and Duqu, because they also use .pnf extensions to destroy files,” Schouwenberg said.

Though Stuxnet and Flame, sabotage and espionage malware that also targeted systems in the Middle East, are related, Schouwenberg said there appears to be no direct link between Wiper and Flame.

“When we look at how [Wiper] manifests itself in terms of file types on the machine and registry, there doesn't seem to be anything in common,” he said.

Schouwenberg also said that data-wiping Shamoon, which launched attacks on the Middle East energy sector earlier this month, was more than likely a case of Wiper copycats making a less sophisticated piece of malware.

“Maybe those attacks were inspired with all this talk about Wiper,” he said. “We don't see any common links between that and the nation-state sponsored attacks, such as Duqu and Stuxnet.”

Liam Ó Murchú, manager of operations at Symantec Security Response, told on Wednesday that with the limited information known about Wiper, it is difficult to confirm a Duqu-Stuxnet link -- but there have been indicators pointing toward this.

“It's very difficult to get precise information on the Wiper threat and to tie it to other threats,” Murchú said. “But we do believe it may have been delivered by the Stuxnet family of threats.”

He said that files starting with “~d” were created temporarily, only to be eradicated, a trait spotted in Stuxnet and Duqu.

According to Schouwenberg, other discoveries about Wiper include information being destroyed in a certain pattern. The malware first scrubs the machine of its own components, then moves on to other files in the system.

Also, Wiper attacks have usually occurred in the last 10 days of the month, between the 21st and 30th, though Kaspersky researchers aren't sure if this means the malware was designed to activate on a certain date.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

More in News

Ground system for weather satellites contains thousands of 'high-risk' bugs

Ground system for weather satellites contains thousands of ...

An audit of the Joint Polar Satellite System ground system revealed thousands of vulnerabilities, most of which will be addressed in two years when the next version of the system ...

Threat report on Swedish firms shows 93 percent were breached

The study by KPMG and FireEye also found that 49 percent of detected malware was unknown.

Former acting HHS cyber director convicted on child porn charges

Former acting HHS cyber director convicted on child ...

Timothy DeFoggi, who was nabbed by the FBI last year in its Operation Torpedo investigation was convicted by federal jury in Nebraska.