SlideShare a Scribd company logo
GUASS VIRUS

                Complied By
              Santosh Khadsare
GUASS
        Click to edit Master text styles
          Second level
             Third level
                Fourth level
                 o Fifth level
GUASS
GUASS
GAUSS
A new computer virus, dubbed Gauss, has been discovered in
 the Middle East.
Cyber security firm Kaspersky Lab said Gauss is the work of
 the same "factory" or "factories" that built the Stuxnet worm.
There is a mysterious module, known as Godel, that copies
 malicious code onto USB drives when they are plugged into
 infected PCs. Godel's purpose is unknown because some of its
 code is compressed and scrambled using a sophisticated
 encryption method. It only activates when it infects a
 predetermined target.
GAUSS
It estimates the total number of victims is in the tens of
 thousands. The largest number of infections were found were
 in Lebanon, followed by Israel and the Palestinian Territories.
The virus is built using modules with internal names that
 appear to be inspired by famous mathematicians and
 philosophers, including Kurt Godel, Johann Carl Friedrich
 Gauss and Joseph-Louis Lagrange. Kaspersky named the
 entire operation after the Gauss component as it implements
 the data-stealing capabilities .
What is its purpose?
Gauss is a surveillance tool.
It steals credentials for hacking online banking systems, social
  networking sites and email accounts; it also gathers
  information about infected PCs, including web browsing
  history, system passwords and the contents of disk drives.

More Related Content

PPT
Linux basics
PPTX
Cyber fraud (netflix)
PPT
INTERNET SECUIRTY TIPS
PPTX
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
PPT
Linux forensics
PPT
Network forensics1
PPT
Windowsforensics
PPT
Lec 1 apln security(4pd)
Linux basics
Cyber fraud (netflix)
INTERNET SECUIRTY TIPS
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
Linux forensics
Network forensics1
Windowsforensics
Lec 1 apln security(4pd)

More from Santosh Khadsare (13)

PPT
Smart card
PPT
IDS and IPS
PPT
PPT
Linux Forensics
PPT
Web server
PPT
Samba server
PPT
Firewall(linux)
PPT
Securitytips
PPT
Linuxfilesys
PPT
Linuxconcepts
PPT
Introtolinux
DOC
New internet
PPT
Stuxnet flame
Smart card
IDS and IPS
Linux Forensics
Web server
Samba server
Firewall(linux)
Securitytips
Linuxfilesys
Linuxconcepts
Introtolinux
New internet
Stuxnet flame
Ad

Recently uploaded (20)

PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
cuic standard and advanced reporting.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPT
Teaching material agriculture food technology
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Machine learning based COVID-19 study performance prediction
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Encapsulation theory and applications.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Electronic commerce courselecture one. Pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
MYSQL Presentation for SQL database connectivity
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
cuic standard and advanced reporting.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Teaching material agriculture food technology
Network Security Unit 5.pdf for BCA BBA.
Spectral efficient network and resource selection model in 5G networks
Machine learning based COVID-19 study performance prediction
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
NewMind AI Monthly Chronicles - July 2025
Encapsulation theory and applications.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
Electronic commerce courselecture one. Pdf
Big Data Technologies - Introduction.pptx
Review of recent advances in non-invasive hemoglobin estimation
Unlocking AI with Model Context Protocol (MCP)
MYSQL Presentation for SQL database connectivity
Ad

Guassvirus

  • 1. GUASS VIRUS Complied By Santosh Khadsare
  • 2. GUASS Click to edit Master text styles Second level  Third level  Fourth level o Fifth level
  • 5. GAUSS A new computer virus, dubbed Gauss, has been discovered in the Middle East. Cyber security firm Kaspersky Lab said Gauss is the work of the same "factory" or "factories" that built the Stuxnet worm. There is a mysterious module, known as Godel, that copies malicious code onto USB drives when they are plugged into infected PCs. Godel's purpose is unknown because some of its code is compressed and scrambled using a sophisticated encryption method. It only activates when it infects a predetermined target.
  • 6. GAUSS It estimates the total number of victims is in the tens of thousands. The largest number of infections were found were in Lebanon, followed by Israel and the Palestinian Territories. The virus is built using modules with internal names that appear to be inspired by famous mathematicians and philosophers, including Kurt Godel, Johann Carl Friedrich Gauss and Joseph-Louis Lagrange. Kaspersky named the entire operation after the Gauss component as it implements the data-stealing capabilities .
  • 7. What is its purpose? Gauss is a surveillance tool. It steals credentials for hacking online banking systems, social networking sites and email accounts; it also gathers information about infected PCs, including web browsing history, system passwords and the contents of disk drives.