TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Kaspersky Lab Discovers 'Gauss'

104 pointsby sspenceralmost 13 years ago

8 comments

soundsalmost 13 years ago
From the article: "... the installation of a special font called Palida Narrow, and the purpose of this action is still unknown."<p>Would this perhaps be a tracking ability, as described at <a href="https://panopticlick.eff.org" rel="nofollow">https://panopticlick.eff.org</a> (specifically, the list of "System Fonts")<p>It would require the users to visit a site that is collecting this tracking information, but it isn't impossible to imagine a popular site among the target audience being strong-armed by a nation-state into installing something to do this.<p>The tracking is practically invisible to end users.
评论 #4363028 未加载
评论 #4363293 未加载
评论 #4363177 未加载
评论 #4364368 未加载
评论 #4364996 未加载
apawloskialmost 13 years ago
"Another key feature of Gauss is the ability to infect USB thumb drives, using the same LNK vulnerability that was previously used in Stuxnet and Flame."<p>Do we have to repeat the same debate about this one's origin?
评论 #4363156 未加载
nvmcalmost 13 years ago
I like how they call it a "nation-state sponsored cyber-espionage toolkit", and then go on to refer to its unknown creators.
jsannemoalmost 13 years ago
Reading their analysis of Gauss, it appears 0xACDC is used for XOR encryption when communicating with the C&#38;C servers. Didn't we just read about another security company and AC/DC...? <a href="http://news.ycombinator.net/item?id=4286696" rel="nofollow">http://news.ycombinator.net/item?id=4286696</a>
duanebalmost 13 years ago
Probably just a continuation of the same virus that's been going around for years at this point: <a href="http://www.crysys.hu/skywiper/skywiper.pdf" rel="nofollow">http://www.crysys.hu/skywiper/skywiper.pdf</a><p>Kaspersky tends to exaggerate how novel these viruses are.
picklefishalmost 13 years ago
This was a better read for me: <a href="https://www.securelist.com/en/blog?weblogid=208193767" rel="nofollow">https://www.securelist.com/en/blog?weblogid=208193767</a> saw it on slashdot
sgt101almost 13 years ago
Oh ho - and suddenly Standard Chartered is fingered for transactions with Iran!<p>Yuk Yuk Yuk - I wonder what is going on with this then!
forgotusernamealmost 13 years ago
What now.. a heavily cybermilitarized nationstate so broke it needs to skim its own citizens' bank accounts? Advanced Persistent Phish?<p>Trying to remember the last time I <i>didn't</i> read about some ultra-dooper-al-quaeda-cyber-virus. Seems any kid with a C compiler these days pumping out cutpasted code qualifies as a complex threat.<p>Coming up: 50 page white paper on the seemingly "innocuous" font (translation: obviously some previously unknown 0day secret intelligence 007 cyber warhead) and its implications for national security funding.
评论 #4363351 未加载
评论 #4363273 未加载