Home Malware Programs Malware Duku

Duku

Posted: November 28, 2011

Threat Metric

Threat Level: 8/10
Infected PCs: 36
First Seen: November 28, 2011
Last Seen: November 15, 2020
OS(es) Affected: Windows

Duku is a backdoor Trojan that uses advanced techniques to steal various forms of information from an infected PC and then transmit that information to external servers. Because Duku shares most of its code and structure with previously-observed Trojans that specialize in attacking very specific industrial targets, a normal PC is unlikely to be harmed by Duku – however, SpywareRemove.com malware experts still recommend that you remove Duku if you find Duku on your PC, since variants of Duku may be geared towards attacking casual computer-users. Like other backdoor Trojans, Duku will show minimal symptoms of being on your PC, and since its propagation method hasn't yet been analyzed, it's recommended that you trust potent and up-to-date anti-malware programs to find and remove Duku infections.

Duku – Close Kin to an Industrial Saboteur

Duku is based on the remarkable Stuxnet Trojan, a backdoor Trojan that was built to sabotage industrial computers that are in use for Iranian nuclear production. Although Duku does share many features in common with Stuxnet such as a timer for self-deactivation, Duku also lacks other functions like Stuxnet's industrial-targeting SCADA (or Supervisory Control and Aata Acquisition) payload. As a RAT or remote access Trojan, Duku can, however, be used to take over an infected PC, and may also steal information such as keyboard input or cached data (including passwords and user login info).

Although Duku is designed to remove itself after thirty-six days, SpywareRemove.com malware researchers don't recommend waiting that long. Instead, you should remove Duku with a good anti-malware program if you do find Duku on your PC. Duku's propagation method hasn't yet been identified, but staying away from malicious sites and suspicious files with wide distribution can help to protect your PC from possible Duku infection vectors.

Building Up a Defense That Even Duku Can't Tear Down

You should refrain from trusting digital certificates for a suspected Duku infection, since SpywareRemove.com malware research team has found Duku infections that use non-revoked digital signatures, although these certificates will, hopefully, be revoked in the future. Since the dropper component of a Duku infection hasn't yet been analyzed, you should practice basic anti-malware safety techniques such as being cautious with network-shared files to prevent your PC from infecting other computers with Duku. Duku's ancestor Stuxnet has also been observed making use of removable drive devices for infecting new targets, and you may wish to exercise particular care about sharing such devices, once they've been in contact with a Duku-infected PC.

Even though Duku is based on a very niche-oriented Stuxnet Trojan, Duku's own capabilities have the potential for broader application than Stuxnet's, and it's recommended that you take steps to protect your personal information after any Duku infection. After removing Duku with a suitable anti-malware program, for example, you may wish to change passwords for all relevant accounts to prevent Duku-affiliated hackers from hijacking your accounts.

Related Posts

Loading...