Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cloud
    • Cloud
    • Cybersecurity
    • Networking

    Fujitsu Working on ‘Good Virus’ to Seek and Destroy Attacking Systems

    Written by

    Fahmida Y. Rashid
    Published January 4, 2012
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Fujitsu is reportedly working on a cyber-weapon for the Japanese government designed to track and disable the sources of cyber-attacks, according to a Japanese newspaper.

      Japan’s Defense Ministry has commissioned Fujitsu to develop a virus capable of tracking, identifying and disabling the systems being used by cyber-attackers, the Yomiuri Shimbun reported Jan. 3. The Defense Ministry’s Technical Research and Development Institute awarded the three-year project, which reportedly has a $2.3 million price tag, to Fujitsu in 2008.

      The project includes both the virus and a system to monitor and analyze cyber-attacks, according to Yomiuri. The virus has already been tested in a “closed network environment” to test the capabilities without it accidentally being released into the wild, anonymous sources told the newspaper.

      Yomiuri said Fujitsu declined comment, citing client confidentiality. The company did not respond to requests for comment from eWEEK.

      The malware under development is designed to trace connections to identify where the cyber-attack is originating from, as well as all the “springboard” computers being used to launch the attack, Yomiuri said. It reportedly has the ability to collect relevant information from the attacking system and disable the malicious program, halting the attack in progress. It appears to be the most effective in tracking back the sources of distributed denial of service (DDoS) attacks as well as some types of attacks aimed at stealing information from compromised systems.

      The idea of tracking down the source of attacks and taking active steps to halt an attack is an increasingly popular concept as organizations shift away from passive defenses. For example, Israel-based Radware offers “counter-attack” capabilities in its Attack Mitigation System to help organizations fight off distributed denial of service attacks.

      Many anti-DDoS systems focus on just increasing the organization’s ability to “absorb” the attacks and try to outlast the attackers, Carl Herberger, vice-president of security solutions at Radware, told eWEEK in an earlier interview. Radware, in contrast, relies on various tools that make it harder for the attacker to sustain the campaign and cause them to abandon the fight, he said.

      Counterattacks are ways to neutralize the attacking tool in a passive, non-intrusive way. Techniques include applying sophisticated filters that slow down the malicious traffic hitting the organization’s servers or just adding some lag time when attacking systems try to establish a connection, according to Radware. These steps would result in the attack taking longer to complete, or even cause the attacking program to time out or crash, thus “exhausting” the attacker into quitting the campaign, Herberger said.

      By that measure, Fujitsu’s attempt to automate the process by disabling the malicious program on the attacking system itself appears to be unique.

      Under Japanese law, the military is restricted from launching cyber-attacks, and this new cyber-weapon is also limited by a law that bans anyone from developing computer viruses. The Defense and Foreign Ministries are reportedly discussing possible legal changes, according to Yomiuri.

      “When you’re trying to gather digital forensic evidence as to what has broken into your network, and what data it may have stolen, it’s probably not wise to let loose a program that starts to trample over your hard drives, making changes,” Graham Cluley, a senior technology consultant at Sophos, wrote on the Naked Security blog. Cluley questioned the ramifications of another application, even if it is a “good virus,” running on another person’s computer.

      However, a Defense Ministry official downplayed the tool’s offensive capabilities, telling Yomiuri that the technology was developed for defensive use, such as identifying which terminal within the Japanese Self-Defense Forces was initially targeted.

      The Japanese government was hit by several attacks in 2011. Mitsubishi Heavy Industries, the country’s largest defense contractor, was infected by an information-stealing Trojan attack in September that successfully stole sensitive information. Several computers belonging to several members of Japan’s parliament were also compromised by a malicious email over the summer.

      Fahmida Y. Rashid
      Fahmida Y. Rashid

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.