{"id":11880,"date":"2011-10-18T10:49:16","date_gmt":"2011-10-18T17:49:16","guid":{"rendered":"http:\/\/blogs.mcafee.com\/?p=11880"},"modified":"2025-06-06T01:32:41","modified_gmt":"2025-06-06T08:32:41","slug":"the-day-of-the-golden-jackal-%e2%80%93-further-tales-of-the-stuxnet-files","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-day-of-the-golden-jackal-%e2%80%93-further-tales-of-the-stuxnet-files\/","title":{"rendered":"The Day of the Golden Jackal \u2013 The Next Tale in the Stuxnet Files: Duqu Updated"},"content":{"rendered":"<p>Stuxnet was possibly the most complex attack of this decade, and we expected that similar attacks would appear in the near future. One thing for sure is that the Stuxnet team is still active&#8211;as recent evidence has revealed. McAfee Labs received a kit from an independent team of researchers that is closely related to the original Stuxnet worm, but with a different goal&#8211;to be\u00a0used for espionage and targeted attacks against sites such as Certificate Authorities (CAs).<\/p>\n<p>How do we know it was the Stuxnet team? To start with, the attacks are targeting CAs in regions occupied by \u201cCanis Aureus,\u201d the Golden Jackal, to execute professional targeted attacks against sites such as small CAs, industry systems, and others. The Stuxnet worm utilized two \u201cstolen\u201d digital certificates belonging to two companies from Taiwan that operated in the same business district. Yet, the Stuxnet-related code, named Duqu, which McAfee Labs received as part of an on-going investigation, was signed with yet another key belonging to the company C-Media Electronics, in Taipei.<\/p>\n<p>The threat that we call Duqu is based on Stuxnet and is very similar. Only a few sites so far are known to have been attacked by the code, and it does not have PLC functionality like Stuxnet. Instead, the code, delivered via exploitation, installs drivers and encrypted DLLs\u00a0that\u00a0function very similarly to the original Stuxnet code. In fact, the new driver\u2019s code used for the injection attack is very similar to Stuxnet, as are several encryption keys and techniques that were\u00a0used in\u00a0Stuxnet.<\/p>\n<p>Duqu is very time sensitive, and is controlled by an extended, encrypted configuration file. It communicates with a command server in India. This IP address has since been blacklisted at the ISP and no longer functions. Yet it was specially crafted to execute sophisticated attacks against key targets and has remote control functionality to install new code on the target. These include keyloggers, which can monitor all actions on systems: running processes, window messages, and so on. Furthermore,\u00a0the keylogger component also contains functionality to\u00a0hide files with a user-mode rootkit.<\/p>\n<p>The file names of the SYS drivers can be cmi4432.sys and jminet7.sys. They relate to two groups of files that have similar functionality. A third file implements the keylogging functions.<\/p>\n<p>McAfee detects the packages as PWS-Duqu, PWS-Duqu.dr, and PWS-Duqu!rootkit.<\/p>\n<p>Both SYS files have almost the exact same code, with a few differences. The main difference is the fact that one of them is digitally signed with a certificate belonging to C-Media, while the other is not.<\/p>\n<h2>Here is an example of the certificate that seemingly belongs to C-Media:<\/h2>\n<figure id=\"attachment_11881\" aria-describedby=\"caption-attachment-11881\" style=\"width: 410px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/securingtomorrow.mcafee.com\/?attachment_id=11881\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-11881\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2011\/10\/certificate_ok.png\" alt=\"\" width=\"410\" height=\"478\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/10\/certificate_ok.png 410w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/10\/certificate_ok-257x300.png 257w\" sizes=\"auto, (max-width: 410px) 100vw, 410px\" \/><\/a><figcaption id=\"caption-attachment-11881\" class=\"wp-caption-text\">&#8220;C-Media Electronics&#8221; digital certificate used by the malware<\/figcaption><\/figure>\n<p>Since the discovery of this malware, the certificate above has been revoked by VeriSign as we can see in the image below:<\/p>\n<figure id=\"attachment_11882\" aria-describedby=\"caption-attachment-11882\" style=\"width: 419px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/securingtomorrow.mcafee.com\/?attachment_id=11882\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-11882\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2011\/10\/certificate_revoked_path.png\" alt=\"\" width=\"419\" height=\"522\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/10\/certificate_revoked_path.png 419w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/10\/certificate_revoked_path-240x300.png 240w\" sizes=\"auto, (max-width: 419px) 100vw, 419px\" \/><\/a><figcaption id=\"caption-attachment-11882\" class=\"wp-caption-text\">Certificate revoked by VeriSign<\/figcaption><\/figure>\n<p>The purpose of the SYS file seems to be only to decrypt and execute the primary payload DLL. Each SYS file works with a different set of files that in turn generate different DLLs. The graph below shows the connections found between the samples so far:<\/p>\n<figure id=\"attachment_11883\" aria-describedby=\"caption-attachment-11883\" style=\"width: 561px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/securingtomorrow.mcafee.com\/?attachment_id=11883\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-11883\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2011\/10\/file_relation.png\" alt=\"\" width=\"561\" height=\"604\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/10\/file_relation.png 561w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/10\/file_relation-278x300.png 278w\" sizes=\"auto, (max-width: 561px) 100vw, 561px\" \/><\/a><figcaption id=\"caption-attachment-11883\" class=\"wp-caption-text\">File relationships for PWS-Duqu<\/figcaption><\/figure>\n<p>As we can see above, the method used by both SYS files is very similar. The PNF file is an encrypted DLL that is decrypted and injected into arbitrary system processes. This DLL in turn decrypts another DLL that contains the malicious code used to hide the presence of the malware in memory.<\/p>\n<p>Both groups above also contain another module, sortXXXX.nls (where XXXX can be any hexadecimal character), shown in red above. It seems to be responsible for the malware&#8217;s malicious activities, such as command and control communications.<\/p>\n<p>The keylogger module works a little differently from the SYS files, but it also uses a module with the same name as the other components. This file is hidden using the same method as the other modules. Although the files are different, both rootkits work more or less in the same way.<\/p>\n<p>Another relationship among the keylogger and the other two modules is that each uses the same decryption key for the strings stored in its data section. The strings indicate these modules have the capability to disable security tools, targeting some specific antivirus products.<\/p>\n<p>McAfee Labs advises Certificate Authorities to carefully verify if their systems might have been affected by this threat or any variations. As we publish this blog, McAfee Labs has also identified a likely variation of this attack at another site.<\/p>\n<p>McAfee Labs would like to thank the independent team working on the investigation of this case and their contributions to our research.<\/p>\n<figure id=\"attachment_11884\" aria-describedby=\"caption-attachment-11884\" style=\"width: 687px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/securingtomorrow.mcafee.com\/?attachment_id=11884\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-11884\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2011\/10\/Golden_Jackal.png\" alt=\"\" width=\"687\" height=\"496\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/10\/Golden_Jackal.png 687w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/10\/Golden_Jackal-300x216.png 300w\" sizes=\"auto, (max-width: 687px) 100vw, 687px\" \/><\/a><figcaption id=\"caption-attachment-11884\" class=\"wp-caption-text\">Source: Wikipedia<\/figcaption><\/figure>\n<p>&#8212;&#8212;&#8211; UPDATE October 25 &#8212;&#8212;&#8212;&#8212;&#8211;<\/p>\n<p>I thought I would share a copy of my Duqu slides that I recently presented on:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2011\/10\/Duqu1.pdf\">Duqu &#8211; Threat Research and Analysis<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Stuxnet was possibly the most complex attack of this decade, and we expected that similar attacks would appear in the&#8230;<\/p>\n","protected":false},"author":671,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[76,32,124,180],"coauthors":[3919],"class_list":["post-11880","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-cybercrime","tag-data-protection","tag-global-threat-intelligence","tag-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Day of the Golden Jackal \u2013 The Next Tale in the Stuxnet Files: Duqu Updated | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Stuxnet was possibly the most complex attack of this decade, and we expected that similar attacks would appear in the near future. One thing for sure is\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Day of the Golden Jackal \u2013 The Next Tale in the Stuxnet Files: Duqu Updated | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Stuxnet was possibly the most complex attack of this decade, and we expected that similar attacks would appear in the near future. One thing for sure is\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-day-of-the-golden-jackal-%e2%80%93-further-tales-of-the-stuxnet-files\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2011-10-18T17:49:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-06T08:32:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/10\/certificate_ok.png\" \/>\n\t<meta property=\"og:image:width\" content=\"410\" \/>\n\t<meta property=\"og:image:height\" content=\"478\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-day-of-the-golden-jackal-%e2%80%93-further-tales-of-the-stuxnet-files\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-day-of-the-golden-jackal-%e2%80%93-further-tales-of-the-stuxnet-files\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/54def583f45ad6d756d23342342d6199\"},\"headline\":\"The Day of the Golden Jackal \u2013 The Next Tale in the Stuxnet Files: Duqu Updated\",\"datePublished\":\"2011-10-18T17:49:16+00:00\",\"dateModified\":\"2025-06-06T08:32:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-day-of-the-golden-jackal-%e2%80%93-further-tales-of-the-stuxnet-files\/\"},\"wordCount\":841,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-day-of-the-golden-jackal-%e2%80%93-further-tales-of-the-stuxnet-files\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2011\/10\/certificate_ok.png\",\"keywords\":[\"cybercrime\",\"data protection\",\"global threat intelligence\",\"malware\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-day-of-the-golden-jackal-%e2%80%93-further-tales-of-the-stuxnet-files\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-day-of-the-golden-jackal-%e2%80%93-further-tales-of-the-stuxnet-files\/\",\"name\":\"The Day of the Golden Jackal \u2013 The Next Tale in the Stuxnet Files: Duqu Updated | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-day-of-the-golden-jackal-%e2%80%93-further-tales-of-the-stuxnet-files\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-day-of-the-golden-jackal-%e2%80%93-further-tales-of-the-stuxnet-files\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2011\/10\/certificate_ok.png\",\"datePublished\":\"2011-10-18T17:49:16+00:00\",\"dateModified\":\"2025-06-06T08:32:41+00:00\",\"description\":\"Stuxnet was possibly the most complex attack of this decade, and we expected that similar attacks would appear in the near future. One thing for sure is\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-day-of-the-golden-jackal-%e2%80%93-further-tales-of-the-stuxnet-files\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-day-of-the-golden-jackal-%e2%80%93-further-tales-of-the-stuxnet-files\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-day-of-the-golden-jackal-%e2%80%93-further-tales-of-the-stuxnet-files\/#primaryimage\",\"url\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2011\/10\/certificate_ok.png\",\"contentUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2011\/10\/certificate_ok.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-day-of-the-golden-jackal-%e2%80%93-further-tales-of-the-stuxnet-files\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"The Day of the Golden Jackal \u2013 The Next Tale in the Stuxnet Files: Duqu Updated\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/54def583f45ad6d756d23342342d6199\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/7027f28dd0ec2b30c201e9c884669577\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/04\/McAfee-Logo-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/04\/McAfee-Logo-96x96.jpg\",\"caption\":\"McAfee\"},\"description\":\"Questions about Blog Central? Email mcafeesocialmedia@mcafee.com for answers.\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/rubywilliams\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Day of the Golden Jackal \u2013 The Next Tale in the Stuxnet Files: Duqu Updated | McAfee Blog","description":"Stuxnet was possibly the most complex attack of this decade, and we expected that similar attacks would appear in the near future. One thing for sure is","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"The Day of the Golden Jackal \u2013 The Next Tale in the Stuxnet Files: Duqu Updated | McAfee Blog","og_description":"Stuxnet was possibly the most complex attack of this decade, and we expected that similar attacks would appear in the near future. One thing for sure is","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-day-of-the-golden-jackal-%e2%80%93-further-tales-of-the-stuxnet-files\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2011-10-18T17:49:16+00:00","article_modified_time":"2025-06-06T08:32:41+00:00","og_image":[{"width":410,"height":478,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/10\/certificate_ok.png","type":"image\/png"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-day-of-the-golden-jackal-%e2%80%93-further-tales-of-the-stuxnet-files\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-day-of-the-golden-jackal-%e2%80%93-further-tales-of-the-stuxnet-files\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/54def583f45ad6d756d23342342d6199"},"headline":"The Day of the Golden Jackal \u2013 The Next Tale in the Stuxnet Files: Duqu Updated","datePublished":"2011-10-18T17:49:16+00:00","dateModified":"2025-06-06T08:32:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-day-of-the-golden-jackal-%e2%80%93-further-tales-of-the-stuxnet-files\/"},"wordCount":841,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-day-of-the-golden-jackal-%e2%80%93-further-tales-of-the-stuxnet-files\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2011\/10\/certificate_ok.png","keywords":["cybercrime","data protection","global threat intelligence","malware"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-day-of-the-golden-jackal-%e2%80%93-further-tales-of-the-stuxnet-files\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-day-of-the-golden-jackal-%e2%80%93-further-tales-of-the-stuxnet-files\/","name":"The Day of the Golden Jackal \u2013 The Next Tale in the Stuxnet Files: Duqu Updated | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-day-of-the-golden-jackal-%e2%80%93-further-tales-of-the-stuxnet-files\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-day-of-the-golden-jackal-%e2%80%93-further-tales-of-the-stuxnet-files\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2011\/10\/certificate_ok.png","datePublished":"2011-10-18T17:49:16+00:00","dateModified":"2025-06-06T08:32:41+00:00","description":"Stuxnet was possibly the most complex attack of this decade, and we expected that similar attacks would appear in the near future. One thing for sure is","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-day-of-the-golden-jackal-%e2%80%93-further-tales-of-the-stuxnet-files\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-day-of-the-golden-jackal-%e2%80%93-further-tales-of-the-stuxnet-files\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-day-of-the-golden-jackal-%e2%80%93-further-tales-of-the-stuxnet-files\/#primaryimage","url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2011\/10\/certificate_ok.png","contentUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2011\/10\/certificate_ok.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-day-of-the-golden-jackal-%e2%80%93-further-tales-of-the-stuxnet-files\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"The Day of the Golden Jackal \u2013 The Next Tale in the Stuxnet Files: Duqu Updated"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/54def583f45ad6d756d23342342d6199","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/7027f28dd0ec2b30c201e9c884669577","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/04\/McAfee-Logo-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/04\/McAfee-Logo-96x96.jpg","caption":"McAfee"},"description":"Questions about Blog Central? Email mcafeesocialmedia@mcafee.com for answers.","url":"https:\/\/www.mcafee.com\/blogs\/author\/rubywilliams\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/11880","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/671"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=11880"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/11880\/revisions"}],"predecessor-version":[{"id":215173,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/11880\/revisions\/215173"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=11880"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=11880"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=11880"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=11880"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}