Jun 10, 2015 · 1 minute

The countries responsible for the Stuxnet virus, which sabotaged Iran's nuclear efforts in 2010, reportedly spied on the country's nuclear talks earlier this year.

Kaspersky reports that malware related to Stuxnet was used to spy on networks used by some of the hotels that hosted the talks between Iran, the United States, China, the United Kingdom, Russia, and France for several months last winter.

The malware, which has been named Duqu 2.0, was discovered after Kaspersky noticed its own network was affected by it. The company describes its attacker as "one of the most skilled, mysterious and powerful threat actors" in the world.

Here's what the company had to say about the malware itself:

The attack included some unique and earlier unseen features and almost didn’t leave traces. The attack exploited zero-day vulnerabilities and after elevating privileges to domain administrator, the malware is spread in the network through MSI (Microsoft Software Installer) files which are commonly used by system administrators to deploy software on remote Windows computers. The cyberattack didn’t leave behind any disk files or change system settings, making detection extremely difficult. The philosophy and way of thinking of the 'Duqu 2.0' group is a generation ahead of anything seen in the APT world.
It also revealed that it wasn't the only one targeted by this malware:
Other victims have been found in Western countries, as well as in countries in the Middle East and Asia. Most notably, some of the new 2014-2015 infections are linked to the events and venues related to the negotiations with Iran about a nuclear deal. The threat actor behind Duqu appears to have launched attacks at the venues where the high level talks took place. In addition to the P5+1 events, the Duqu 2.0 group launched a similar attack in relation to the 70th anniversary event of the liberation of Auschwitz-Birkenau. Similar to the P5+1 events, these meetings were attended by many foreign dignitaries and politicians.
No countries have claimed responsibility for Stuxnet or related efforts, including Duqu. Yet reports have indicated for years that the malware was developed through a partnership between the United States and Israel.