{"id":3347,"date":"2012-03-08T02:15:32","date_gmt":"2012-03-08T08:15:32","guid":{"rendered":"http:\/\/bucktownbell.com\/?p=3347"},"modified":"2012-03-08T02:21:53","modified_gmt":"2012-03-08T08:21:53","slug":"researchers-seek-help-in-solving-duqu-mystery-language","status":"publish","type":"post","link":"http:\/\/bucktownbell.com\/?p=3347","title":{"rendered":"Researchers Seek Help in Solving DuQu Mystery Language"},"content":{"rendered":"<blockquote><p>While other parts of DuQu are written in the C++ programming language and are compiled with Microsoft\u2019s Visual C++ 2008, this part is not, according to Alexander Gostev, chief security expert at Kaspersky Lab. Gostev and his team have also determined that it\u2019s not Objective C, Java, Python, Ada, Lua or many other languages they know.<\/p><\/blockquote>\n<p>via <a href=\"http:\/\/www.wired.com\/threatlevel\/2012\/03\/duqu-mystery-language\/\">Researchers Seek Help in Solving DuQu Mystery Language | Threat Level | Wired.com<\/a>.<\/p>\n<blockquote><p>The module is an important part of DuQu\u2019s payload \u2014 which is the part of DuQu that performs malicious functions once it\u2019s on an infected machine. The module allows DuQu\u2019s DLL file to operate completely independent of other DuQu modules. It also takes data stolen from infected machines and transmits it to command-and-control servers and has the ability to distribute additional malicious payloads to other machines on a network, in order to spread the infection.<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>While other parts of DuQu are written in the C++ programming language and are compiled with Microsoft\u2019s Visual C++ 2008, this part is not, according to Alexander Gostev, chief security expert at Kaspersky Lab. Gostev and his team have also &hellip; <a href=\"http:\/\/bucktownbell.com\/?p=3347\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[54],"tags":[347,86],"class_list":["post-3347","post","type-post","status-publish","format-standard","hentry","category-programming","tag-malware","tag-windows"],"_links":{"self":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/3347","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3347"}],"version-history":[{"count":2,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/3347\/revisions"}],"predecessor-version":[{"id":3349,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/3347\/revisions\/3349"}],"wp:attachment":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3347"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3347"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3347"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}