Tech firm to develop cyber weapon

2012-01-01

Helen Martin

Virus Bulletin, UK
Editor: Helen Martin

Abstract

Japanese government to use virus for defensive purposes.


Tech firm Fujitsu has reportedly been commissioned by the Japanese government to develop malware that will track, identify and disable the sources of cyber attacks.

According to The Daily Yomiuri, a three-year project was launched in 2008 to develop the ‘cyber weapon’ as well as to research and test security tools and network monitoring equipment. The newspaper reports that the new virus – which has undergone testing in a closed network environment – can identify not only the immediate source of attack, but also all ‘springboard’ computers used in the attack, and that it also has the ability to disable the malicious program and harvest relevant information.

According to officials, the Defense Ministry intends to use the virus for defensive purposes, such as identifying intrusions and tracing the source of attacks against Japanese Self-Defense Force systems.

The development of malware tools for beneficial purposes has long been a controversial topic within the anti-malware industry, there being immense scope for problems – whether due to countermeasures developed by the attackers, or the possibility of the tool falling into the wrong hands. However, several governments (including France and Germany) are already believed to be using specially developed spyware tools to assist in tracking criminals and terrorists, while cyber weapons are said to be in use in countries including the United States and China.

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest articles:

Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

Aditya Sood & Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited to compromise the C&C panel in order to gather threat intelligence, and present a model of mobile AppInjects.

Cryptojacking on the fly: TeamTNT using NVIDIA drivers to mine cryptocurrency

TeamTNT is known for attacking insecure and vulnerable Kubernetes deployments in order to infiltrate organizations’ dedicated environments and transform them into attack launchpads. In this article Aditya Sood presents a new module introduced by…

Collector-stealer: a Russian origin credential and information extractor

Collector-stealer, a piece of malware of Russian origin, is heavily used on the Internet to exfiltrate sensitive data from end-user systems and store it in its C&C panels. In this article, researchers Aditya K Sood and Rohit Chaturvedi present a 360…

Fighting Fire with Fire

In 1989, Joe Wells encountered his first virus: Jerusalem. He disassembled the virus, and from that moment onward, was intrigued by the properties of these small pieces of self-replicating code. Joe Wells was an expert on computer viruses, was partly…

Run your malicious VBA macros anywhere!

Kurt Natvig wanted to understand whether it’s possible to recompile VBA macros to another language, which could then easily be ‘run’ on any gateway, thus revealing a sample’s true nature in a safe manner. In this article he explains how he recompiled…


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.