Select your localized edition:

Close ×

More Ways to Connect

Discover one of our 28 local entrepreneurial communities »

Be the first to know as we launch in new countries and markets around the globe.

Interested in bringing MIT Technology Review to your local market?

MIT Technology ReviewMIT Technology Review - logo

 

Unsupported browser: Your browser does not meet modern web standards. See how it scores »

Mystery weapon: some of the inner workings of the Gauss malware. Credit: Kaspersky

The Gauss malware described last week that targets Lebanese bank accounts still has one secret to divulge - the purpose of its “encrypted warhead” known as Godel. That’s the term used by researchers at Kaspersky, the computer security firm that described Gauss last week, for a part of the malware programmed to decrypt only when it lands on exactly the right computer system. What Godel does under those conditions is unknown, and today, Kaspersky laid out what it knows about Godel and asked for help determining its purpose.

[T]oday we are presenting all the available information about the payload in the hope that someone can find a solution and unlock its secrets. We are asking anyone interested in cryptology and mathematics to join us in solving the mystery and extracting the hidden payload.

Kaspersky says Gauss is related to government-sponsored cyberweapons Stuxnet and Flame, and the company’s researchers and some other experts believe Gauss was also created by a nation state. Godel can only be decrypted with a key built using information drawn from the computer it has infected, specifically information about programs installed on the system. Until someone figures out exactly what Godel’s looking for, it’s impossible to know what it will do when activated. Kaspersky’s researchers are considering the possibility that it is intended to attack SCADA - industrial control - systems, like those in use by the Iranian nuclear program disrupted by Stuxnet:

The resource section is big enough to contain a Stuxnet-like SCADA targeted attack code and all the precautions used by the authors indicate that the target is indeed high profile.

3 comments. Share your thoughts »

Tagged: Computing

Reprints and Permissions | Send feedback to the editor

From the Archives

Close

Introducing MIT Technology Review Insider.

Already a Magazine subscriber?

You're automatically an Insider. It's easy to activate or upgrade your account.

Activate Your Account

Become an Insider

It's the new way to subscribe. Get even more of the tech news, research, and discoveries you crave.

Sign Up

Learn More

Find out why MIT Technology Review Insider is for you and explore your options.

Show Me
×

A Place of Inspiration

Understand the technologies that are changing business and driving the new global economy.

September 23-25, 2014
Register »