World Bulletin / News Desk
A computer virus was used to hack into venues linked to international talks on Iran's nuclear programme, Russian computer security company Kaspersky Lab said on Wednesday.
The Wall Street Journal said the virus was widely believed to be used by Israeli spies and Kaspersky had linked it to "three luxury European hotels" used in the negotiations involving Iran and six world powers.
Kaspersky said it looked into the "cyber-intrusion" after detecting the "Duqu 2.0" malware in its own systems in early spring this year, which it said was designed to spy on its technology, research, and internal processes.
Other victims of Duqu had been found in Western countries, the Middle East and Asia, it said in an emailed statement.
"Most notably, some of the new 2014-2015 infections are linked to the P5+1 events and venues related to the negotiations with Iran about a nuclear deal," the statement said.
The unidentified group behind the Duqu malware, according to Kaspersky, was "one of the most skilled, mysterious and powerful threat actors in the APT (advanced persistent threat) world". Advanced persistent threats typically refer to sophisticated software created by state-backed cyberspies.
Kaspersky said Duqu was previously used for an unspecified cyberattack in 2011 that bore similarities to Stuxnet, a computer "worm" that partially sabotaged Iran's nuclear programme in 2009-2010 by destroying a thousand or more centrifuges that were enriching uranium.
Another Duqu attack, Kaspersky said, was carried out "in relation to" the commemoration of the 70th anniversary in January this year of the liberation of the Auschwitz-Birkenau Nazi concentration camp in Poland.
That ceremony was attended by the heads of state of Germany, France, Britain and other nations.Güncelleme Tarihi: 10 Haziran 2015, 17:28