Duqu hackers wipe all servers going back to 2009

The hackers behind the Duqu botnet have shut down their snooping operation, a security researcher said today.

The 12 known command-and-control (CC) servers for Duqu were scrubbed of all files on 20 October, 2011, according to Moscow-based Kaspersky Lab.

That was just two days after rival antivirus firm Symantec went public with its analysis of Duqu, a Trojan horse-based botnet that many security experts believe shared common code and characteristics with Stuxnet, the super-sophisticated worm that last year sabotaged Iran’s nuclear program.

Duqu was designed, said Symantec and Kaspersky, by advanced hackers, most likely backed by an unknown country’s government. Unlike Stuxnet, it was not crafted to wreak havoc on uranium enrichment centrifuges, but to scout out vulnerable installations and computer networks as a lead-in to the development of another worm targeting industrial control systems.

“I think this part of the [Duqu] operation is now closed.” said Roel Schouwenberg, a Kaspersky senior researcher, in an emailed reply to questions today. “[But] that’s not to say a new/modified operation may be under way.”

Each variant used a different server

Earlier Wednesday, another Kaspersky expert posted an update on the company’s investigation into Duqu that noted the hackers’ house-cleaning.

According to Kaspersky, each Duqu variant – and it knows of an even dozen – used a different compromised server to manage the PCs infected with that specific version of the malware. Those servers were located in Belgium, India, the Netherlands and Vietnam, among other countries.

“The attackers wiped every single server they had used as far back as 2009,” Kaspersky said, referring to the aforementioned cleaning job.

The hackers not only deleted all their files from those systems, but double-checked afterward that the cleaning had been effective, Kaspersky noted. “Each [CC server] we’ve investigated has been scrubbed,” said Schouwenberg.

Kaspersky also uncovered clues about Duqu’s operation that it has yet to decipher.

The attackers quickly updated each compromised server’s version of OpenSSH – for Open BSD Secure Shell, an open-source toolkit for encrypting Internet traffic – to a newer edition, replacing the stock 4.3 version with the newer 5.8.

Although there have been reports that OpenSSH contains an unpatched, or “zero-day,” vulnerability – perhaps exploited by the Duqu hackers to hijack legitimate servers for their own use – Kaspersky eventually rejected that theory, saying it was simply “too scary” to contemplate.

Protecting stolen servers from other criminals

Even so, it was one of two reasons Schouwenberg proposed for the fast update to OpenSSH 5.8.

“The logical assumption here is that we’re looking at possibly a vulnerability in the older version and/or an added feature in the new version that’s of use to the attacker,” said Schouwenberg.

By updating OpenSSH from the possibly-vulnerable OpenSSH 4.3, the Duqu developers may have intended to ensure that other criminals couldn’t steal their stolen servers.

Iran, which last year acknowledged some systems, including ones in its nuclear facilities, had been infected with Stuxnet, two weeks ago admitted Duqu had also wiggled its way onto PCs in the country.

Duqu has been traced to attacks in several countries other than Iran, including the Sudan, and may have been under construction since August 2007.

Article source: http://rss.feedsportal.com/c/270/f/3551/s/1a914942/l/0Lnews0Btechworld0N0Csecurity0C33222170Cduqu0Ehackers0Ewipe0Eall0Eservers0Egoing0Eback0E20A0A90C0Dolo0Frss/story01.htm

View full post on National Cyber Security » Computer Hacking