Did you like this?
friends and colleagues.
Kaspersky Lab recently announced the discovery of Gauss, a complex, nation-state sponsored cyber-espionage toolkit. Gauss contains many info-stealing capabilities, with a specific focus on browser passwords, online banking account credentials, and system configurations of infected machines. Kaspersky Lab’s experts discovered Gauss by identifying the commonalities the malicious program shares with Flame. Since late May 2012, more than 2,500 infections have been recorded by Kaspersky Lab’s cloud-based security system, with the majority of infections found in the Middle East.
Kaspersky Lab’s experts published a research paper about Gauss that analyzed its primary functions and characteristics, in addition to its architecture, the malware’s unique modules, communication methods, and its infection statistics. However, several mysteries and unanswered questions about Gauss still remain. One of the most intriguing aspects is related to Gauss’s encrypted payload.
The encrypted payload is located in Gauss’s USB data-stealing modules and is designed to surgically target a certain system (or systems) which have a specific program installed. Once an infected USB stick is plugged into a vulnerable computer, the malware is executed and tries to decrypt the payload by creating a key to unlock it. The key is derived from specific system configurations on the machine. For instance, it includes the name of a folder in Program Files which must have its first character written into an extended character set such as Arabic or Hebrew. If the malware identifies the appropriate system configurations, it will successfully unlock and execute the payload.
“The purpose and functions of the encrypted payload currently remain a mystery,” said Aleks Gostev, Chief Security Expert, Global Research and Analysis Team, Kaspersky Lab. “The use of cryptography and the precautions the authors have used to hide this payload indicate its targets are high profile. The size of the payload is also a concern. It’s big enough to contain coding that could be used for cyber-sabotage, similar to Stuxnet’s SCADA code. Decrypting the payload will provide a better understanding of its overall objective and the nature of this threat.”
Kaspersky Lab would like to invite anyone with an interest in cryptography, reverse engineering or mathematics to help find the decryption keys and unlock the hidden payload. More details and a technical description of the problem are available in our blogpost at Securelist.com
About Kaspersky Lab
Kaspersky Lab is the world’s largest privately held vendor of endpoint protection solutions. The company is ranked among the world’s top four vendors of security solutions for endpoint users*. Throughout its 15-year history Kaspersky Lab has remained an innovator in IT security and provides effective digital security solutions for consumers, SMBs and Enterprises. The company currently operates in almost 200 countries across the globe, providing protection for over 300 million users worldwide. Learn more at www.kaspersky.com.
*The company was rated fourth in the IDC rating Worldwide Endpoint Security Revenue by Vendor, 2010. The rating was published in the IDC report Worldwide IT Security Products 2011-2015 Forecast and 2010 Vendor Shares – December 2011. The report ranked software vendors according to earnings from sales of endpoint security solutions in 2010.
Related Press Releases Articles
Kaspersky Lab Survey: Consumers View Online Communication Tools as Unsecure, Use them AnywayLearn more >
Kaspersky Lab Patents Automated False-Positive Testing Technology Based on Machine Learning Algorithms
Kaspersky Lab Patents Automated False-Positive Testing Technology Based on Machine Learning AlgorithmsLearn more >
Russian Cybergangs Stole Some $790 Million Over 3 Years - Dark ReadingLearn more >