Attacks/Breaches
8/9/2012
11:18 AM
Connect Directly
RSS
E-Mail
50%
50%

Flame 2.0: Gauss Malware Targets Banking Credentials

Stuxnet, Duqu, and Flame cousin has been used in targeted attacks, operating undetected for at least a year, primarily in Middle Eastern countries.

Malware watchers, meet Flame and Stuxnet's cousin, known as Gauss, which is espionage software apparently commissioned by a nation state and first used as early as August 2011.

Here's what's known about Gauss: The surveillance malware has been designed to collect banking details, is apparently used only in highly targeted attacks, and has infected an inordinate number of PCs in Lebanon. Still, its exact purpose--including the potential motive that a nation state would have in stealing people's banking credentials--so far remains a mystery.

"In 140 chars or less, Gauss is a nation state sponsored banking Trojan which carries a warhead of unknown designation," according to an analysis of Gauss published by the global research and analysis team at Kaspersky Lab. "Besides stealing various kinds of data from infected Windows machines, it also includes an unknown, encrypted payload which is activated on certain specific system configurations."

[ Keep your identity safe. See 8 Ways To Avoid Getting Your Life Hacked. ]

There are clear links between the modules used by Gauss and Flame, which is related to Stuxnet, which in turn is related to Duqu. In other words, all four pieces of malware appear to have been commissioned--if not developed--by the same entity. "Just like Duqu was based on the 'Tilded' platform on which Stuxnet was developed, Gauss is based on the 'Flame' platform," according to Kaspersky Lab. "It shares some functionalities with Flame, such as the USB infection subroutines."

As with Flame, whoever controls Gauss can push various plug-ins to infected PCs. These plug-ins can do everything from relaying system configuration data and intercepted browser cookies and passwords to attackers, to stealing credentials used for Middle Eastern banks as well as social network login credentials. "The modules have internal names which appear to pay tribute to famous mathematicians and philosophers, such as Kurt Godel, Johann Carl Friedrich Gauss, and Joseph-Louis Lagrange," according to Kaspersky Lab. "The module named 'Gauss' is the most important in the malware as it implements the data stealing capabilities and we have therefore named the malware toolkit by this most important component."

Kaspersky Lab said it discovered Gauss while continuing to participate in an effort commissioned by the International Telecommunications Union (ITU), which Kaspersky said is behind a program "aimed at mitigating the risks posed by cyber-weapons, which is a key component in achieving the overall objective of global cyber-peace."

Interestingly, an ITU request to Kaspersky, earlier this year, to evaluate unknown malware that was found to be deleting sensitive information led to the discovery of Flame. Since then, Kaspersky has been analyzing other malware to see if it resembled Flame, and found "glaring similarities" in Gauss.

One feature of Stuxnet, Flame, and Gauss is that they've tended to operate undetected for significant periods of time. Flame, for example, was used in highly targeted attacks since at least 2010, and perhaps as far back as 2007, before being discovered in June 2012. "Flame is a prime example of why governments and industry must work together to tackle cybersecurity at the global level," said ITU secretary-general Hamadoun Toure in a statement, issued after Flame was discovered. "Early warning of new threats is vital."

In the case of Gauss, the first known variant appeared in August 2011, which is interesting, since that's the month when Hungary's CrySyS Lab announced that it had discovered Duqu. Meanwhile, the most recent version of Gauss debuted in January 2012. Kaspersky said it's logged only 2,500 Gauss infections since May 2012, though it estimates that the total number of infections will number in the tens of thousands. Finally, it said that the five command-and-control servers giving Gauss-infected PCs instructions and retrieving targeted data went dark in July 2012, though they could be restarted at any time.

Thanks to the developers forgetting to remove debugging information, Kaspersky noted some file designations with the name "white," which it said appears to refer to Lebanon, the name of which comes from the Semitic root word that means "white." On a related note, it's seen the vast majority of Gauss infections in Lebanon, followed by Israel and Palestine. Meanwhile, a handful of infections have been traced to PCs in the United States, United Arab Emirates, Qatar, Jordan, Germany, and Egypt.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0972
Published: 2014-08-01
The kgsl graphics driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not properly prevent write access to IOMMU context registers, which allows local users to select a custom page table, and consequently write ...

CVE-2014-2627
Published: 2014-08-01
Unspecified vulnerability in HP NonStop NetBatch G06.14 through G06.32.01, H06 through H06.28, and J06 through J06.17.01 allows remote authenticated users to gain privileges for NetBatch job execution via unknown vectors.

CVE-2014-3009
Published: 2014-08-01
The GDS component in IBM InfoSphere Master Data Management - Collaborative Edition 10.0 through 11.0 and InfoSphere Master Data Management Server for Product Information Management 9.0 and 9.1 does not properly handle FRAME elements, which makes it easier for remote authenticated users to conduct ph...

CVE-2014-3302
Published: 2014-08-01
user.php in Cisco WebEx Meetings Server 1.5(.1.131) and earlier does not properly implement the token timer for authenticated encryption, which allows remote attackers to obtain sensitive information via a crafted URL, aka Bug ID CSCuj81708.

CVE-2014-3534
Published: 2014-08-01
arch/s390/kernel/ptrace.c in the Linux kernel before 3.15.8 on the s390 platform does not properly restrict address-space control operations in PTRACE_POKEUSR_AREA requests, which allows local users to obtain read and write access to kernel memory locations, and consequently gain privileges, via a c...

Best of the Web
Dark Reading Radio