Go to the Globe and Mail homepage

Jump to main navigationJump to main content

John Bumgarner, a cyber warfare expert who is chief technology officer of the U.S. Cyber Consequences Unit, a non-profit group that studies the impact of cyber threats, holds a notebook computer while posing for a portrait in Charlotte in this December 1, 2011 file photo. A United Nations agency charged with helping member nations secure their national infrastructures plans to issue a sharp warning about the risk of the Flame virus that was recently discovered in Iran and other parts of the Middle East. Evidence suggest that the virus, dubbed Flame, may have been built on behalf of the same nation or nations that commissioned the Stuxnet worm that attacked Iran's nuclear program in 2010, according to Kaspersky Lab, the Russian cyber security software maker that took credit for discovering the infections. (John Adkisson/Reuters/John Adkisson/Reuters)
John Bumgarner, a cyber warfare expert who is chief technology officer of the U.S. Cyber Consequences Unit, a non-profit group that studies the impact of cyber threats, holds a notebook computer while posing for a portrait in Charlotte in this December 1, 2011 file photo. A United Nations agency charged with helping member nations secure their national infrastructures plans to issue a sharp warning about the risk of the Flame virus that was recently discovered in Iran and other parts of the Middle East. Evidence suggest that the virus, dubbed Flame, may have been built on behalf of the same nation or nations that commissioned the Stuxnet worm that attacked Iran's nuclear program in 2010, according to Kaspersky Lab, the Russian cyber security software maker that took credit for discovering the infections. (John Adkisson/Reuters/John Adkisson/Reuters)

‘Gauss’ the latest weaponized computer virus found in Mideast Add to ...

A new cyber surveillance virus has been found in the Middle East that can spy on financial transactions, e-mail and social networking activity, according to a leading computer security firm, Kaspersky Lab.

Dubbed Gauss, the virus may also be capable of attacking critical infrastructure and was built in the same laboratories as Stuxnet, the computer worm widely believed to have been used by the United States and Israel to attack Iran’s nuclear program, Kaspersky Lab said on Thursday.

More Related to this Story

The Moscow-based firm said it found Gauss had infected personal computers in Lebanon, Israel and the Palestinian Territories. It declined to speculate on who was behind the virus but said it was related to Stuxnet and two other cyber espionage tools, Flame and Duqu.

“After looking at Stuxnet, Duqu and Flame, we can say with a high degree of certainty that Gauss comes from the same ‘factory’ or ‘factories,’ ” Kaspersky Lab said in a posting on its website. “All these attack toolkits represent the high end of nation-state-sponsored cyber-espionage and cyber war operations.”

Kaspersky Lab’s findings are likely to fuel a growing international debate over the development and use of cyber weapons. Those discussions were stirred up by the discovery of Flame in May by Kaspersky and others. Washington has declined comment on whether it was behind Stuxnet.

According to Kaspersky Lab, Gauss can steal Internet browser passwords and other data, send information about system configurations, steal credentials for accessing banking systems in the Middle East, and hijack login information for social networking sites, e-mail and instant messaging accounts.

Modules in the Gauss virus have internal names that Kaspersky Lab researchers believe were chosen to pay homage to famous mathematicians and philosophers, including Johann Carl Friedrich Gauss, Kurt Godel and Joseph-Louis Lagrange.

Kaspersky Lab said it called the virus Gauss because that is the name of the most important module, which implements its data-stealing capabilities.

One of the firm’s top researchers said Gauss also contains a module known as “Godel” that may include a Stuxnet-like weapon for attacking industrial control systems.

Stuxnet, discovered in 2010, attacked via USB drives and was designed to attack computers that controlled the centrifuges at a uranium enrichment facility in Natanz, Iran.

Roel Schouwenberg, a senior researcher with Kaspersky, said the Godel code may include a similar “warhead.”

Godel copies a compressed, encrypted program onto USB drives. That program will only decompress and activate when it comes in contact with a targeted system.

While Kaspersky has yet to fully crack Godel’s code, Schouwenberg said he suspects it is a cyber weapon designed to cause physical damage and that its developers went to a lot of trouble to hide its purpose, using an encryption scheme that could take months or even years to unravel.

He said the prospect that a cyber weapon like Gauss or Stuxnet could attack critical infrastructure keeps him up at night.

“They could do pretty much anything,” he said. “A few weeks ago when power went out in and around (Washington) D.C., my first thought was a cyber weapon.”

Kaspersky said it is searching for “world-class” cryptographers to help it break the code.

A United Nations agency that advises countries on protecting critical infrastructure plans to send an alert on the mysterious code.

“We are going to, of course, inform member states that there is an unknown payload,” said Marco Obiso, a cyber security co-ordinator for the UN’s Geneva-based International Telecommunications Union, or ITU.

“We don’t know what exactly it does. We can have some ideas. We are going to emphasize this,” he said.

The ITU issued a warning about Flame shortly after the virus was unveiled by Kaspersky in late May. The agency told member nations that Flame could potentially be used to attack critical infrastructure, according to Mr. Obiso.

At the time , experts knew only that Flame was a sophisticated espionage tool; they were not certain it could damage computer networks.

Several weeks later , researchers at another security firm, Symantec Corp, confirmed suspicions that F lame was capable of deleting computer data and likely was used to attack Iran in April.

Iran blamed Flame for causing data loss on computers in the country’s main oil export terminal and Oil Ministry. Reports of the data losses prompted the ITU to ask Kaspersky to search for a data-wip ing virus, which resulted in its discovery of Flame and Gauss.

Follow us on Twitter: @GlobeTechnology

In the know

Most popular video »

Highlights

More from The Globe and Mail

Most Popular Stories