“The software, capable of controlling this virus (Duqu), has been provided to organizations and institutions,” IRNA quoted Brigadier General Gholamreza Jalali as saying on Sunday.
Duqu, discovered on September 1, 2011, is a sophisticated Trojan which acts as a backdoor into a system and facilitates the theft of private intelligence.
Security software manufacturer Symantec says parts of the Duqu code base are nearly identical to the infamous Stuxnet worm, “but with a completely different purpose.”
The Duqu malware has reportedly infected a number of systems in Iran.
“All of the centers and apparatuses suspected of being infected with the virus are under control,” Jalali said, adding that countering and cleansing processes have been carried out at the infected institutions.
Stuxnet, first indentified by Iranian officials in June 2010, is a malware designed to infect computers using supervisory control and data acquisition (SCADA) systems made by the German company Siemens — which are favored by industries that manage water supplies, oilrigs, and power plants.
In July, media reports claimed that Stuxnet had targeted industrial computers around the globe, with Iran being the main target of the attack. The reports said Iran’s newly launched Bushehr nuclear power plant was at the center of the cyber attack.
However, Iranian experts detected the worm in time, averting any damage to the country’s industrial sites and resources.
“The (Iranian) cyber defense base is working round the clock to adopt the necessary measures to counter cyber attacks and the infiltration of spyware,” Jalili stated.