The Duqu virus is squarely aimed at Iran’s nuclear program. Unless you’re connected with Iran’s nuclear program, your chances of being directly targeted are extremely low. However, Microsoft was freaked out enough to issue a security bulletin for Windows users. So, better safe than sorry, protect yourself against the possibility of becoming collateral damage in an epic, upcoming attack.
Microsoft issues Duqu virus workaround for Windows
Microsoft has issued a temporary fix to the pernicious Duqu virus — also known as “Son of Stuxnet” — which could affect users of Windows XP, Vista, Windows 7 as well as Windows Server 2008.
The company promised the security update earlier this week as it races to deal with the virus, which targets victims via email with a Microsoft Word attachment. The virus is not in the email, but in the attachment itself. A Symantec researcher said if a user opens the Word document, the attacker could take control of the PC, and nose around in an organization’s network to look for data, and the virus could propagate itself.
See also:
Microsoft Security Advisory (2639658)
Microsoft software bug linked to ‘Duqu’ virus
Microsoft Provides Workaround Patch for Duqu Malware
Microsoft announces workaround for the Duqu exploit
Microsoft Issues Temporary Duqu Workaround, Plans 4 Patch Tuesday Fixes
Six Ways to Protect Yourself from Duqu
Microsoft Airs Temporary Fix to Defeat Duqu Worm
Microsoft Releases Temporary Plug For Duqu
Duqu exploits same Windows font engine patched last month, Microsoft confirms
5 Things To Do To Defend Against Duqu
Microsoft issues temporary ‘fix-it’ for Duqu zero-day
Patch Tuesday: Fix for ‘Duqu’ zero-day not likely this month
Is it just me or doesn’t it seem a bit more than odd that Microsoft, a company with close ties to and a past history of working with U.S. intelligence agencies, would publicly issue a workaround to defend against a specific piece of malware that, by many accounts, is being actively and currently used by U.S. intelligence agencies to set up and facilitate an upcoming attack, in cyberspace or otherwise, against Iran’s nuclear program? I mean, it’s not like the Iranians can’t read English, why help them defend against Duqu? Hmmm, something’s not quite right here.
/whatever’s going on, and something is going on, it’s way above my pay grade, but when the endgame comes, don’t forget to duck
Filed under: Blog Entry | Tagged: 2639658, Advisory, Aimed, Attachment, Attack, Attacker, Bulletin, Collateral Damage, Company, Control, Crossfire, Cyberattack, Data, Document, Duqu, Duqu Virus, Email, Extremely Low, Fix, Freaked Out, Iran, Iranian Nuclear Program, Issued, Issues, Look For, Microsoft, Microsoft Security Advisory, Microsoft Word, Microsoft Word Attachment, Network, Nose Around, Nuclear, Nuclear Program, Opens, Organization, PC, Possibility, Program, Promised, Propagate, Protect, Protect Yourself, Researcher, Security, Security Advisory, Security Bulletin, Security Update, Son Of Stuxnet, Stuxnet, Symantec, Symantec Researcher, Take, Take Control, Targeted, Targets, Temporary, Temporary Fix, Update, Victims, Virus, Vista, Windows, Windows 7, Windows Server 2008, Windows Users, Windows XP, Word Document, Workaround, Yourself | 2 Comments »