Incidents

Stuxnet and stolen certificates

Yesterday, our colleagues from ESET discovered a new version of Stuxnet, which has its driver signed by yet another trusted party – “JMicron Technology Corp.”.

JMicron is a rather well known hardware producer, I’ve myself owned about three or four different computers which had JMicron components inside.

The initial RT certificate was suspicious, but another stolen certificate raises interesting questions.

One possibility here is that both JMicron and Realtek got infected with a trojan such as Zeus, that steals digital certificates. Then, the cybercriminals who got the certificates, either re-sold them on the market or used them by themselves to sign the Stuxnet drivers.

To be honest, the fact that trojans were stealing digital certificates did not really seem that impressive when I have first seen this capability.

Now, coupled with the Stuxnet story, it begins to make sense.

Stuxnet and stolen certificates

Your email address will not be published. Required fields are marked *

 

Reports

Meet the GoldenJackal APT group. Don’t expect any howls

GoldenJackal is an APT group, active since 2019, that usually targets government and diplomatic entities in the Middle East and South Asia. The main feature of this group is a specific toolset of .NET malware, JackalControl, JackalWorm, JackalSteal, JackalPerInfo and JackalScreenWatcher.

APT trends report Q1 2023

For more than five years, the Global Research and Analysis Team (GReAT) at Kaspersky has been publishing quarterly summaries of advanced persistent threat (APT) activity. These summaries are based on our threat intelligence research; and they provide a representative snapshot of what we have published and discussed in greater detail in our private APT reports.

Subscribe to our weekly e-mails

The hottest research right in your inbox