Iran has said that they had successfully found a way to “control” the malware Duqu, which is similar to Stuxnet virus that attacked its nuclear program infected more than 30,000 computers in 2010. The software developed to control the Duqu virus has been made available to companies and organizations in Iran. The virus was eliminated and all organizations affected by the virus are now under control while their cyber defense unit works around the clock to protect against attacks and viruses.
TDuqu virus infections have been reported in countries including Iran, France, Britain, and India according Symantec. The virus takes advantage of vulnerabilities in a Windows font-parsing engine to plant malicious code in the heart of a computer system.
The similarities between the Duqu and the malicious worm Stuxnet have caused speculation that the same culprits may be involved, though this has not been proven. While Duqu is similar to Stuxnet, Duqu was developed to gather information for future attacks on industrial control systems. Stuxnet was created to attack computer control systems made by Seimens and usually used to to manage water supplies, oil rigs, power plants, and other crucial infrastructure. Most Stuxnet infections have been reported in Iran, which has caused speculation that it was made to sabotage Iranian nuclear facilities. The worm was also designed to recognize the system that it was meant to target.
It has also been previously reported in January by the New York Times that the US and Israeli intelligence services worked together to develop the worm in order to sabotage Iran’s efforts to make a nuclear bomb.