Link spotted between Wiper virus and Stuxnet, Duqu

Share this article:

Researchers now believe the mysterious Wiper virus, which targeted Iran's oil ministry in April by destroying files and erasing data, may be a cousin of Stuxnet and Duqu.

On Wednesday, Kaspersky Lab released a blog post detailing new information about Wiper, a challenging feat as the malware leaves virtually nothing behind to be analyzed.

Roel Schouwenberg, senior researcher at Kaspersky Lab, told SCMagazine.com on Wednesday that a pattern was discovered regarding the way Wiper vanquished information in its path.

“We found that Wiper tries to destroy files with a .pnf extension first, which made us think back to Stuxnet and Duqu, because they also use .pnf extensions to destroy files,” Schouwenberg said.

Though Stuxnet and Flame, sabotage and espionage malware that also targeted systems in the Middle East, are related, Schouwenberg said there appears to be no direct link between Wiper and Flame.

“When we look at how [Wiper] manifests itself in terms of file types on the machine and registry, there doesn't seem to be anything in common,” he said.

Schouwenberg also said that data-wiping Shamoon, which launched attacks on the Middle East energy sector earlier this month, was more than likely a case of Wiper copycats making a less sophisticated piece of malware.

“Maybe those attacks were inspired with all this talk about Wiper,” he said. “We don't see any common links between that and the nation-state sponsored attacks, such as Duqu and Stuxnet.”

Liam Ó Murchú, manager of operations at Symantec Security Response, told SCMagazine.com on Wednesday that with the limited information known about Wiper, it is difficult to confirm a Duqu-Stuxnet link -- but there have been indicators pointing toward this.

“It's very difficult to get precise information on the Wiper threat and to tie it to other threats,” Murchú said. “But we do believe it may have been delivered by the Stuxnet family of threats.”

He said that files starting with “~d” were created temporarily, only to be eradicated, a trait spotted in Stuxnet and Duqu.

According to Schouwenberg, other discoveries about Wiper include information being destroyed in a certain pattern. The malware first scrubs the machine of its own components, then moves on to other files in the system.

Also, Wiper attacks have usually occurred in the last 10 days of the month, between the 21st and 30th, though Kaspersky researchers aren't sure if this means the malware was designed to activate on a certain date.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

Millenials improve security habits, more interested in cyber careers, still need guidance

Millenials improve security habits, more interested in cyber ...

Raytheon's second annual survey on the online and security behavior of Millennials shows improvement but still a long way to go.

Pakistani man indicted over spyware app creation

Hammad Akbar created StealthGenie, which allowed the purchaser to secretly monitor a cell phone's communications.

FDA finalizes guidelines on medical device, patient data security

The recommendations are aimed at providing better protecting patient health and data, as well as hoping device manufacturers take into account cybersecurity risks in the early stages of development.