Dark Reading: 4 Unsolved Mysteries About Duqu 2.0
Several key questions remain surrounding the nation-state attack targeting intel at Kaspersky Lab, international participants at the Iranian nuclear negotiations, and other organizations.
6/11/2015
By Kelly Jackson Higgins
Kaspersky Lab's revelation yesterday that it had been hacked by a nation-state apparently hungry for intelligence on its research and newest technologies aimed at thwarting the very same type of attacker rocked both the security and diplomatic communities. Although the security firm provided in-depth analysis of some of the code and zero-day exploits used by the attackers in the so-called Duqu 2.0 campaign, there a still a few key things Kaspersky Lab and other security experts studying the malware admit they don't know about the attacks.
Besides the obvious whodunit question -- none of the researchers would comment despite plenty of fingers pointing at Israel -- there are some other big unanswered questions about this bold cyber espionage campaign:
Click the URL above to read the full article



Votes:11