Iran says it has neutralized Stuxnet-like Duqu malware

By JPOST.COM STAFF, REUTERS
November 13, 2011 18:26

 
X

Dear Reader,
As you can imagine, more people are reading The Jerusalem Post than ever before. Nevertheless, traditional business models are no longer sustainable and high-quality publications, like ours, are being forced to look for new ways to keep going. Unlike many other news organizations, we have not put up a paywall. We want to keep our journalism open and accessible and be able to keep providing you with news and analyses from the frontlines of Israel, the Middle East and the Jewish World.

As one of our loyal readers, we ask you to be our partner.

For $5 a month you will receive access to the following:

  • A user experience almost completely free of ads
  • Access to our Premium Section
  • Content from the award-winning Jerusalem Report and our monthly magazine to learn Hebrew - Ivrit
  • A brand new ePaper featuring the daily newspaper as it appears in print in Israel

Help us grow and continue telling Israel’s story to the world.

Thank you,

Ronit Hasin-Hochman, CEO, Jerusalem Post Group
Yaakov Katz, Editor-in-Chief

UPGRADE YOUR JPOST EXPERIENCE FOR 5$ PER MONTH Show me later

Iran on Sunday claimed that it had found a way to successfully neutralize Duqu computer malware, which is similar to the Stuxnet virus, AFP reported on Sunday.

Stuxnet is believed to have crippled centrifuges that Iran uses to enrich uranium for what the United States and some European nations have charged is a covert nuclear weapons program. The New York Times reported in January that the US and Israel created Stuxnet in order to hinder Iran's nuclear program.

"The elimination [of Duqu] was carried out and the organizations penetrated by the virus are under control," Iran's head of civil defense, Brig.-Gen. Gholamreza Jalali told the official IRNA news agency, according to AFP.

Security software firm Symantec said in a report last month that it was alerted by a research lab with international connections to a malicious code that "appeared to be very similar to Stuxnet." It was named Duqu because it creates files with "DQ" in the prefix. Security firms including Dell Inc's SecureWorks, Intel Corp's McAfee, Kaspersky Lab and Symantec say they found Duqu victims in Europe, Iran, Sudan and the United States.

Join Jerusalem Post Premium Plus now for just $5 and upgrade your experience with an ads-free website and exclusive content. Click here>>

Related Content

Breaking news
October 21, 2018
Trump: U.S. to exit nuclear treaty, citing Russian violations

By REUTERS