Virus found in Mideast can spy on bank transactions

Advertisement
By Reuters | Updated: 10 August 2012 10:00 IST
A new cyber surveillance virus has been found in the Middle East that can spy on banking transactions and steal login information for social networking sites, email and instant messaging, according to a leading computer security firm, Kaspersky Lab.

Dubbed Gauss, the virus may also be capable of attacking critical infrastructure and was very likely built in the same laboratories as Stuxnet, the computer worm widely believed to have been used by the United States and Israel to attack Iran's nuclear program, Kaspersky Lab said on Thursday.

The Moscow-based firm said it found Gauss had infected more than 2,500 personal computers, the bulk of them in Lebanon, Israel and the Palestinian territories. Targets included Lebanon's BlomBank, ByblosBank and Credit Libanais, as well as Citigroup Inc's Citibank and eBay's PayPal online payment system.

Advertisement

Officials with the three Lebanese banks said they were unaware of the virus. PayPal spokesman Anuj Nayar said the company was investigating the matter but was not aware of any increase in "rogue activity" as a result of Gauss. A Citibank spokeswoman declined to comment.

Kaspersky Lab would not speculate on who was behind Gauss, but said the virus was connected to Stuxnet and two other related cyber espionage tools, Flame and Duqu. The U.S. Department of Defense declined to comment.

Advertisement

"After looking at Stuxnet, Duqu and Flame, we can say with a high degree of certainty that Gauss comes from the same 'factory' or 'factories,'" Kaspersky said on its website. "All these attack toolkits represent the high end of nation state sponsored cyber espionage and cyber war operations."

Kaspersky's findings are likely to fuel a growing international debate over the development and use of cyber weapons and espionage tools. Those discussions were stirred up by the discovery of Flame in May by Kaspersky and others.

Advertisement

Jeffrey Carr, an expert on cyber warfare who runs a small security firm known as Taia Global, said the U.S. government has long monitored Lebanese banks for clues about the activities of militant groups and drug cartels. He said Gauss was likely built by adapting technology deployed in Flame.

"You've got this successful platform. Why not apply it to this investigation into Lebanese banks and whether or not they are involved in money laundering for Hezbollah?" he said.

Advertisement

Several analysts said they were not surprised to hear that most of the Gauss infections were discovered in Lebanon. "Beirut is a hot spot for the clandestine movement of money by states," said a former U.S. intelligence expert on money laundering who asked not to be named.

New York's state banking regulator this week accused Britain's Standard Chartered Plc of violating U.S. anti-money laundering laws by scheming with Iran to hide more than $250 billion of transactions.

Experts said that surveillance viruses like Gauss are perfect tools for government intelligence units to gather information for such investigations, though they did not specifically link Gauss to the Standard Chartered case.

"Espionage happens all the time," said Mikko Hypponen, chief research officer at anti-virus software maker F Secure. "In the old days you had to go where the information was to copy it. Today it is on computers and networks."

Homage to mathematicians
According to Kaspersky Lab, Gauss can also steal Internet browser passwords and other data, and send information about system configurations.

Modules in the virus have internal names that Kaspersky Lab researchers believe were chosen to pay homage to famous mathematicians and philosophers, including Johann Carl Friedrich Gauss, Kurt Godel and Joseph-Louis Lagrange.

Kaspersky Lab said it called the virus Gauss because that is the name of the most important module, which implements its data-stealing capabilities.

One of the firm's top researchers said Gauss also contains a module known as "Godel" that may include a Stuxnet-like weapon for attacking industrial control systems. Stuxnet, discovered in 2010, was used to attack computers that controlled the centrifuges at a uranium enrichment facility in Natanz, Iran.

Roel Schouwenberg, a senior researcher with Kaspersky, said the Godel code may include a similar "warhead."

Godel copies a compressed, encrypted program onto USB drives. That program will only decompress and activate when it comes in contact with a targeted system.

While Kaspersky has yet to fully crack Godel's code, Schouwenberg said he suspects it is a cyber weapon designed to cause physical damage and that its developers went to a lot of trouble to hide its purpose, using an encryption scheme that could take months or even years to unravel.

UN to issue warning
A United Nations agency that advises countries on protecting infrastructure plans to send an alert on the mysterious code.

"We don't know what exactly it does. We can have some ideas. We are going to emphasize this," said Marco Obiso, a cyber security coordinator for the Geneva-based International Telecommunications Union, or ITU.

Kaspersky estimates the total number of victims in the tens of thousands. More than half of the 2,500 found since May were in Lebanon, while only 43 were in the United States.

The U.S. Department of Homeland Security said it was analyzing the potential threat posed by Gauss.

"The department's cyber security analysts are working with organizations that could potentially be affected to detect, mitigate and prevent such threats,' said DHS spokesman Peter Boogaard.

Researchers at Symantec Corp, the biggest maker of security software, have begun analyzing Gauss and said it appeared at first blush to be related to Stuxnet, Duqu and Flame, according to a spokeswoman for the company.

Copyright Thomson Reuters 2012

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Further reading: Duqu, Flame, Internet, Kaspersky, Stuxnet
Advertisement
Popular Mobile Brands
  1. Xiaomi TV S Mini LED 75 (2026) Review
  2. Vivo X300 FE Roundup: Expected Price in India, Specifications
  3. Poco M8s 5G Debuts Globally With 7,000mAh Battery: See Price, Features
  4. Redmi K90 Max Debuts With Active Cooling Fan, 8,550mAh Battery: See Price
  5. These Vivo Smartphones Will Cost More in India Due to the Latest Price Hike
  6. Vivo Y6t Launched With 6,500mAh Battery, Snapdragon 4 Gen 2 SoC
  7. Oppo Find X9 Ultra With 200-Megapixel Periscope Camera Launched Globally
  8. Motorola Razr 2026 Launch Date Teased Alongside Design and Colour Options
  1. NASA Shuts Down Voyager 1 Instrument to Extend Mission Life in Deep Space
  2. Oppo Enco Clip 2 With Open-Ear Design, Up to 40 Hours Total Battery Life Launched Alongside Oppo Watch X3 Mini
  3. Vivo Y6t Launched With 6,500mAh Battery, Snapdragon 4 Gen 2 SoC: Price, Specifications
  4. OCBC Partners Lion Global Investors and DigiFT to Launch Tokenised Gold Fund With GOLDX Token
  5. Oppo Pad 5 Pro Launched With 13,380mAh Battery, Snapdragon 8 Elite Gen 5 SoC Alongside Oppo Pad Mini: Price, Features
  6. Redmi K90 Max Launched With Dimensity 9500 SoC, 8,550mAh Battery and Active Cooling Fan: Price, Specifications
  7. Oppo Find X9 Ultra Launched With Snapdragon 8 Elite Gen 5 SoC, 200-Megapixel Periscope Camera: Price, Specifications
  8. Oppo Find X9s Pro Launched With 200-Megapixel Cameras, 7,025mAh Battery: Price, Specifications
  9. OnePlus Ace 6 Ultra Geekbench Listing Reveals MediaTek Dimensity 9500 Chip, 16GB RAM
  10. Motorola Edge 70 Pro+ Leaked Renders Hint at Design, Five Colour Options
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.