Researchers at Kaspersky Lab in Russia are asking the public for help in cracking an encrypted warhead that gets delivered to infected machines by the Gauss malware toolkit.
The warhead gets decrypted by the malware using a key composed of configuration data from the system it's targeting. But without knowing what systems it's targeting or the configuration on that system, the researchers have been unable to reproduce the key to crack the encryption.
"We are asking anyone interested in cryptology, numerology and mathematics to join us in solving the mystery and extracting the hidden payload," the researchers write in a blog post published Tuesday.
The payload is delivered to machines via an infected USB stick that uses the .lnk exploit to execute the malicious activity. In addition to the encrypted payload, infected USB sticks deliver two other files that also contain encrypted sections that Kaspersky has been unable to crack.
"The code that decrypts the sections is very complex compared to any regular routine we usually find in malware," Kaspersky writes. Kaspersky believes one of these sections may contain data that helps crack the payload.
Last week, Kaspersky disclosed that it had found a http://wired_threatlevel.api.contextly.com/redirect/?id=JszqfLqQeE&click=inbody, apparently designed by the same people behind the http://wired_threatlevel.api.contextly.com/redirect/?id=yETOJ8ZniT&click=inbody, that has infected at least 2,500 machines so far, primarily in Lebanon.
Continued : http://www.wired.com/threatlevel/2012/08/gauss-mystery-payload/
@ the Kaspersky Lab Weblog: The Mystery of the Encrypted Gauss Payload ....
'We are providing the first 32 bytes of encrypted data and hashes from known variants of the modules. If you are a world class cryptographer or if you can help us with decrypting them, please contact us by e-mail: theflame@kaspersky.com.'

Chowhound
Comic Vine
GameFAQs
GameSpot
Giant Bomb
TechRepublic