CRN
  • Home
  • News
  • Security

Foxconn name used to hack into hotel systems: Kaspersky

By Reuters Staff on Jun 16, 2015 7:39AM
Foxconn name used to hack into hotel systems: Kaspersky

In The Spotlight

Introducing the CRN State of the MSP report

IoT Explained: What is the Internet of Things in Australia (June 2022)

Come to CRN's CyberSecurity Live Event!

See who was at Channel Meets: UC in Sydney

Further research into the sophisticated computer virus used to hack into hotels where the Iran nuclear talks took place has found it took advantage of digital credentials stolen from the world's top contract electronics maker Foxconn.

Russian security company Kaspersky Lab said on Monday US time that researchers learned the Duqu 2.0 virus had redirected computer traffic by using a legitimate digital certificate from Taiwan's Hon Hai, also known as Foxconn.

Foxconn customers have included many of the world's biggest electronic makers, including Apple, Blackberry, Google, Huawei and Microsoft.

Kaspersky revealed its initial findings in a report last week in which it said it found the virus in conferencing equipment at three European hotels used in talks involving Iran and six world powers, among other targets.

Digital certificates are the credentials which identify legitimate computers on a network. They act as the basis of e-commerce and other largely automated transactions on the web.

In recent years, cyberspies have begun to exploit stolen certificates to trick machines into thinking malicious software comes from legitimate computers, an escalation posing a grave threat to business done over the Internet, security experts say.

Targeted attacks

The "P5+1" group of six world powers have been negotiating with Iran on curbs to its disputed nuclear program - the United States, Russia, China, Britain, France and Germany.

The on-again, off-again series of talks to reach a comprehensive nuclear deal with Iran have been held in Geneva, Lausanne, Montreux, Munich and Vienna since last year.

Both Moscow-based Kaspersky and US security company Symantec said the virus shared some programming with previously discovered espionage software called Duqu, which security experts believe to have been developed by Israelis.

Israel, which has strongly opposed the powers' diplomatic opening to its arch-enemy Iran, denied any connection with the virus. In February, the United States accused Israel of using selective leaks from the talks to distort the US position.

The west suspects Iran wants to develop a nuclear weapons capability from its enrichment of uranium. Iran says it wants nuclear energy only for electricity and medical isotopes.

Symantec and Kaspersky analysts have said there was overlap between Duqu and Stuxnet, a US-Israeli project that sabotaged Iran's nuclear program in 2009-10 by destroying a thousand or more centrifuges that were enriching uranium.

The Stuxnet virus took advantage of stolen digital certificates from two other major Taiwanese companies, JMicron Technology Corp and Realtek Semiconductor Corp, Kaspersky said in a report it published in 2010.

"Duqu attackers are the only ones who have access to these certificates, which strengthens the theory they hacked the hardware manufacturers in order to get these certificates," Kaspersky said in a summary of its report on Monday US time.

Kaspersky said it had notified Foxconn of the stolen credentials. Foxconn was not immediately available to comment on steps it has taken to secure its systems.

Last week, Kaspersky said Duqu 2.0 had evolved from the earlier Duqu, which had been deployed against unidentified targets for years before it was discovered in 2011.

It said Duqu 2.0 used three previously unknown flaws in Microsoft Corp software to infect machines, for which the software giant subsequently released patches to fix. The attack left almost no traces.

(Reporting by Eric Auchard in Frankfurt and Joseph Menn in San Francisco; Editing byMark Heinrich)

Got a news tip for our journalists? Share it with us anonymously here.
Copyright Reuters
© 2019 Thomson Reuters. Click for Restrictions.
Tags:
duqu foxconn iran nuclear talks kaspersky lab security stuxnet virus

Partner Content

How to prepare for the increasing demand for cloud-ready partners
Promoted Content
How to prepare for the increasing demand for cloud-ready partners
Why rock-solid MSPs services require unified infrastructure monitoring
Promoted Content
Why rock-solid MSPs services require unified infrastructure monitoring
Tradewinds has turned unified communications into an easier upsell
Promoted Content
Tradewinds has turned unified communications into an easier upsell
Microsoft, Yealink and Alloy’s roadshows fire up the Australian channel
Promoted Content
Microsoft, Yealink and Alloy’s roadshows fire up the Australian channel
Is business nbn Enterprise Ethernet the future of business connectivity for MSPs?
Promoted Content
Is business nbn Enterprise Ethernet the future of business connectivity for MSPs?

Sponsored Whitepapers

How vulnerability scans identify & protect against cyberthreats before criminals locate them
How vulnerability scans identify & protect against cyberthreats before criminals locate them
Monitoring & automation: A primer for MSPs
Monitoring & automation: A primer for MSPs
Endpoint Detection and Response
Endpoint Detection and Response
How to put your infrastructure into overdrive
How to put your infrastructure into overdrive
MSPs: Stack your solutions
MSPs: Stack your solutions
By Reuters Staff
Jun 16 2015
7:39AM
0 Comments

Related Articles

  • Melbourne's Wevo deploys Cradlepoint gear on Bunzl's network
  • Ingram Micro launches Cybersecurity Practice Builder program
  • Canberra security ISV ArchTIS scores $7 million Department of Defence contract
  • SolarWinds says it can prevent another ‘Sunburst’ attack
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

What customers have said about their MSPs

What customers have said about their MSPs

TPG Telecom launches WA private cloud region

TPG Telecom launches WA private cloud region

State of the MSP

State of the MSP

Sydney's FullCRM shakes up leadership team

Sydney's FullCRM shakes up leadership team

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.