It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

Whoever Wrote the Duqu Trojan's Framework Wrote It in an Unknown Programming Language

page: 2
17
<< 1   >>

log in

join
share:

posted on Mar, 9 2012 @ 03:01 PM
link   
Most likely it is written in the same language as the Siemens PLC systems are programmed with.

SIMATIC / STEP7 Frameworks would be such an example. After all you need the payload to interact directly with the PLC system in order to achieve the desired effect.




posted on Mar, 9 2012 @ 03:22 PM
link   
reply to post by H1ght3chHippie
 


Stuxnet was the virus for targeting Siemens controllers. This virus was the new and improved with the ability to do other things. VMware virtual software is probly the software. And it would be classified and considered trade secret on the software itself because that iswhat they are selling. Plus antivirus software would not work on the virtual pc software itself to know if it was infected or doing something it was not supposed to. And the US government has gotten pretty good at playing with the virtual software. They were able to catch anonymous with their trick of using tor on a computer then opening a virtual machine on that computer and running tor on that machine ran through the tor of the main computer. They picked up on it and can now even trace them through that maze.



posted on Mar, 9 2012 @ 03:54 PM
link   
"It's pretty much common knowledge that stuxnet was written in Israel by a israeli and american team
at a plant that is well documented as being setup identical to the one in Iran for the express purpose..."

Says a friend of mine.

New York Times Article



posted on Mar, 9 2012 @ 04:03 PM
link   
I wish I knew how to do this type of stuff.



posted on Mar, 9 2012 @ 04:17 PM
link   
I saw this actually! kind of proves the state developed theory but most of us kind of knew that anyway. Hope they can figure out the coding as this in the wild could be a nasty piece of death if it ever does what its been designed for



posted on Mar, 9 2012 @ 04:30 PM
link   
Aliens. They don't want us playing with nukes. They wrote the base code using a language that has never been seen on Earth before, because it is not from Earth. Either that, or the security analyst are really bad at what they do.



posted on Mar, 9 2012 @ 04:40 PM
link   
i have a funny feeling if aliens wrote code it would look similar to background noise if intercepted,
and therefore discounted as code,

it would be "running" from point to point on the internet backbone and use data streams to hide, to generate signal noise/data loss as its code, in this way the data would be the encryption to the "noise" as the loss would be the acual data stream.

noise filter modem anyone?

lol

sorry

xploder



posted on Mar, 9 2012 @ 04:55 PM
link   
reply to post by JBA2848
 


You fail to understand the article. No-one is speaking about "software" they are speaking about the object oriented programming language in which the payload has been written. Read the article again.



posted on Mar, 9 2012 @ 05:05 PM
link   
Genius!

i bet the worlds best hackers/programers/whatever could cure cancer if we got them all together.

.. but instead they are busy jailbreking the latest idevice or something along that nature.



posted on Mar, 9 2012 @ 08:20 PM
link   
reply to post by H1ght3chHippie
 


VMware software is written in special programming langauge that crosses platforms.There is no programming langauge that crosses platforms in any operating system. VMware software does this.

I find this wikipage interesting on VMware tools.

en.wikipedia.org...(software)#Other_products



Other products
VMware ThinApp, one of the most recent products from the companyVMware vCenter Converter (VMware Converter) comes in both Enterprise ($, bundling and entitlement with vCenter Server) and Standalone (free) versions and is designed primarily for the following tasks:[33]

Convert a physical machine into a virtual machine; referred to as Physical-to-Virtual or P2V.
Convert a virtual machine of one type into another (V2V)
Run automated configuration tasks on VMware ESX/ESXi servers.
Converted VMs are compatible with VMware ESX/ESXi, VMware Server and VMware Workstation. A P2V conversion can be done from any physical machine running Microsoft Windows (XP or later) or Linux based (Linux only works on Standalone version). Conversions can be managed from a centralized console allowing for multiple conversions at the same time (using the Enterprise version). VMware vCenter Converter replaces
Important Topic Updates
the older VMware products "P2V Assistant" and "Importer". P2V Assistant allowed users to convert physical machines into virtual machines; and Importer allowed the import of virtual machines from other products into VMware Workstation.

VMware Capacity Planner, an information technology (IT) capacity planning tool, collects utilization-data in heterogeneous computing environments and compares it to industry-standard reference-data to provide analysis and decision-support modeling.

VMware ACE provides a means of distributing secured virtual desktops to networked client PCs.

VMware ThinApp, formerly Thinstall, is a virtualization suite capable of creating portable software ("portable apps"). This software enables applications to execute without being previously installed.

VMware Infrastructure is a collection of VMware products used to manage a VMware ESX/ESXi server environment.

VMware vSphere is a "cloud OS". VMware vSphere 4 was originally named VMware Virtual Infrastructure (VI) 4 and is capable of managing large pools of infrastructure, including software and hardware[34] both from internal and external networks.

The VMware Tools package adds drivers and utilities to improve the graphical performance for different guest operating systems, including mouse tracking. The package also enables some integration between the guest and host systems, including shared folders, plug-and-play devices, clock synchronisation, and cutting-and-pasting across environments. VMware Inc makes VMware Tools available for Microsoft Windows, Linux, Sun Solaris, FreeBSD, and Novell NetWare guest systems.[35]

On September 11 at VMworld 2007, VMware announced that large portions of VMware Tools for Linux, Solaris, and FreeBSD guests were released under GPL and GPL-compatible licenses. They also announced the creation of the Open Virtual Machine Tools ("open-vm-tools") project on Sourceforge.net.[36]


The last line Sourceforge.net has lots of hacking tools on it.

Heres a example.
sourceforge.net...

Heres VMware GSX Server with LANDesk Management Suite combines with LANDesk Patch Manager to automate patch research, download, deployment, verification and ongoing maintenance. All created for crossplatform patching.

www.vmware.com...
edit on 9-3-2012 by JBA2848 because: (no reason given)
extra DIV



posted on Mar, 9 2012 @ 11:24 PM
link   

Originally posted by JBA2848
VMware software is written in special programming langauge that crosses platforms.There is no programming langauge that crosses platforms in any operating system. VMware software does this.


VMware is written in C. C crosses all platforms. VMware is virtualization software, it's nothing to do with Duqu.



posted on Mar, 10 2012 @ 12:14 AM
link   

edit on 10-3-2012 by Midyew because: (no reason given)



posted on Mar, 10 2012 @ 10:16 AM
link   
Most definately a State funded and sourced trojan. It all adds up really.

Let's suppose you're with Ford and you want to break into the local GM factory, see what they are doing and perhaps sabotage the assembly line to stop them from manufacturing the latest Tahoe or whatever.

The factory is full of robotics and machines that run software written in all kinds of obscure and "uncommon" languages, usually via embedded hardware and single board computers. Using vmware or any other x86 based virtual platform, you could write a trojan to break into the factory and then use virtual machines running the various proprietary languages and apps to not only grab the instructions from every machine on the assembly line and be able to build a blue print of exactly what they are building but you could also sabotage every "smart" machine in the place as well as the master copies of the programs.

At that level, milling machines, assembly robots, even painting robots - all run on networked computers using various proprietary apps written on all kinds of obscure languages.

Taking it a step further, modern military aircraft, including UAV's, have the ability to break into computers / networks wirelessly using a form of RF transmission. Rather than needing a WiFI connection they can hack into systems just by saturating the hardware with the right type of RF transmission.

So, taking our Ford / GM analogy a bit further, let's suppose you have a nuclear research / manufacturing facility the largest countries in the World are concerned with. Let's suppose they want to see what you're up to and perhaps even sabotage those efforts. Believe it or not you could release the right kind of trojan into the wild and wait for it to make it's way into the facility. Failing that it's just a matter of putting the right kind of aircraft, UAV or even satellite within range of the place....



posted on Mar, 10 2012 @ 12:53 PM
link   
VMware uses API and SDK to work cross platform. API is “Application Programming Interface”.And SDK is "Software Development Kit" a package of pre-written code for cross platform programming.

www.vmware.com...

And I guess VMware has been working with Siemens on all their projects as far back as 2008.

www.vmware.com...

And don't forget Siemens even offered sabotage on there PDF to Homeland Security. Page 8

http://__._/spyfiles/docs/siemens/15_siemens-intelligence-platform.html



posted on Mar, 14 2012 @ 11:02 AM
link   
VMware hacking tools for backtrack 5.


A list of the modules present in VASTO is as following:

abiquo_guest_stealer – Abiquo guest stealer

abiquo_poison – Abiquo poison

eucalyptus_bouncer – Eucalyptus Bouncer

eucalyptus_poison – Eucalyptus Poison

oraclevm_oravma_fileread – Oracle VM agent remote code execution

vmware_autopwner – VMautopwn

vmware_guest_stealer – VMware Guest Stealer

vmware_login – VMware Login check scanner

vmware_session_rider – VMware Session Rider

vmware_studio_upload – VMware Studio



new topics

top topics


active topics

 
17
<< 1   >>

log in

join