ANALYTICAL BRIEFREF: DUQU-0326-GE|SOURCE: OSINT / ACADEMIC LITERATURE
UPDATED 13 MAR 2026
DUQU DYNASTY

THE SPY SIDE OF STUXNET

Three Generations of Espionage Malware — Duqu, Flame, and Duqu 2.0 — Built on the Same Codebase That Sabotaged Iran's Nuclear Program

SUBJECT GOSSIP GIRL Supra Threat Actor
REGION Iran / Middle East / Global
PRIORITY HIGH
ANALYST OPEN SOURCE
STATUS HISTORICAL ANALYSIS
SEPT 2011 — CrySyS Lab in Budapest discovers Duqu, Stuxnet's espionage twin, sharing source code via the "Tilded platform" ///MAY 2012 — Kaspersky Lab identifies Flame, a 20MB espionage toolkit active in Iran since at least 2010 ///JUNE 2012 — Kaspersky proves Stuxnet and Flame share code via Resource 207, confirming collaborative development ///AUG 2012 — Gauss discovered targeting Lebanese banks — same codebase as Flame, with an encrypted payload never cracked ///JUNE 2015 — Kaspersky discovers Duqu 2.0 inside its own networks, also found at hotels hosting P5+1 Iran nuclear talks ///APR 2019 — Chronicle researchers reveal GOSSIP GIRL — the supra threat actor umbrella connecting Equation Group, Flame, Duqu, and Flowershop ///SEPT 2011 — CrySyS Lab in Budapest discovers Duqu, Stuxnet's espionage twin, sharing source code via the "Tilded platform" ///MAY 2012 — Kaspersky Lab identifies Flame, a 20MB espionage toolkit active in Iran since at least 2010 ///JUNE 2012 — Kaspersky proves Stuxnet and Flame share code via Resource 207, confirming collaborative development ///AUG 2012 — Gauss discovered targeting Lebanese banks — same codebase as Flame, with an encrypted payload never cracked ///JUNE 2015 — Kaspersky discovers Duqu 2.0 inside its own networks, also found at hotels hosting P5+1 Iran nuclear talks ///APR 2019 — Chronicle researchers reveal GOSSIP GIRL — the supra threat actor umbrella connecting Equation Group, Flame, Duqu, and Flowershop ///

ONE CODEBASE, FOUR WEAPONS

MULTIPLE LOCATIONS — 2011–2019 | KASPERSKY LAB / CrySyS LAB / CHRONICLE

The GOSSIP GIRL Supra Threat Actor: A Collaborative Cyber Weapons Framework

Between 2010 and 2015, security researchers uncovered a family of cyber weapons so sophisticated that each individual discovery reshaped the field's understanding of nation-state offensive capabilities. Stuxnet sabotaged Iranian centrifuges. Duqu stole the intelligence that made that sabotage possible. Flame surveilled the entire Middle Eastern theater. Gauss tracked money flows through Lebanese banks. Duqu 2.0 spied on the diplomatic negotiations meant to resolve the very crisis these tools had created.[1]

What made this family extraordinary was not just the sophistication of each individual tool — it was that they shared code, infrastructure, and zero-day exploits across what appeared to be independent development teams. In 2019, Chronicle researchers Juan Andres Guerrero-Saade and Silas Cutler gave this collaborative umbrella a name: GOSSIP GIRL — a supra threat actor encompassing the Equation Group (NSA-linked), Flame, Duqu (Israel-linked), and a previously unknown fourth group called Flowershop.[2] It was, they argued, the first documented case of modular, multi-agency collaborative cyber weapons development — an approach that would define the next decade of state-sponsored operations.

ZERO-DAYS USED
8+
Across all variants — Windows kernel, TrueType fonts, Kerberos, print spooler exploits[3]
ACTIVE SPAN
2007–2015
Flame module timestamps date to 2007; Duqu 2.0 discovered June 2015[4]
STOLEN CERTS
4+
C-Media, Foxconn, Realtek, JMicron — digital certificates stolen to sign malware as legitimate software[5]

The philosophy and way of thinking of the Duqu 2.0 group is a generation ahead of anything seen in the advanced persistent threats world.

— Kaspersky Lab, Technical Analysis Report, June 2015[6]

DUQU — THE RECONNAISSANCE TWIN

On September 1, 2011, researchers at the Laboratory of Cryptography and System Security (CrySyS Lab) at the Budapest University of Technology and Economics discovered a new piece of malware that made their detection systems think it was Stuxnet. F-Secure's chief research officer Mikko Hyppönen confirmed that Duqu's kernel driver, JMINET7.SYS, was so similar to Stuxnet's MRXCLS.SYS that F-Secure's back-end system initially classified it as Stuxnet itself.[7] Hungarian researcher Boldizsár Bencsáth named the threat "Duqu" after the prefix "~DQ" it gave to files it created, and his team produced a 60-page technical report that would become the foundational document for understanding the Stuxnet platform's espionage branch.[8]

The Mystery of the Framework

Where Stuxnet was a sabotage weapon — designed to physically destroy Iranian centrifuges — Duqu was pure intelligence collection. It deployed keyloggers, captured screenshots, enumerated network configurations, and stole digital certificates from compromised systems.[9] The exfiltrated data was smuggled out inside encrypted 54×54 pixel JPEG image files, sent to command-and-control servers scattered across Germany, Belgium, the Philippines, India, and China.[3] Critically, Duqu was configured to self-destruct after 36 days — an operational security measure designed to limit forensic exposure.[7]

Symantec called it "nearly identical to Stuxnet, but with a completely different purpose" — the precursor to a future Stuxnet-like attack.[9] Both were built on what Kaspersky dubbed the "Tilded platform" (named because both created files beginning with ~D or ~T), sharing kernel code, exploitation techniques, and the same development methodology.[10] But Duqu's targets were different: rather than nuclear facilities, it targeted organizations involved in the manufacturing of industrial control systems — gathering intelligence on the systems Stuxnet would eventually attack.[9]

AN UNKNOWN PROGRAMMING LANGUAGE

One of Duqu's most puzzling technical features was its command-and-control communication module. When Kaspersky Lab reverse-engineered this component, they found it was written in an entirely unrecognizable programming paradigm — neither standard C++, nor C, nor any language they had encountered. After publicly requesting help from the security community, they determined it was written in a custom object-oriented extension of C, compiled with Microsoft Visual Studio 2008 using specific optimization flags.[11]

This was extraordinary. A team with the resources to develop a custom OO framework purely for internal use, compile it with bespoke preprocessor directives, and deploy it in operational malware was operating at a level of software engineering sophistication that eclipsed virtually every known threat actor. It suggested the C&C code may have been reused from a pre-existing, possibly decades-old software project and integrated into the Duqu trojan — hinting at an institutional codebase maintained across generations of operations.[11]

FLAME — THE SURVEILLANCE LEVIATHAN

On May 28, 2012, Kaspersky Lab, CrySyS Lab, and the Iranian National CERT simultaneously announced the discovery of the most complex malware ever analyzed. Flame — also known as Flamer or sKyWIper — was a 20-megabyte modular cyber espionage platform, twenty times larger than Stuxnet, that had been operating undetected across the Middle East since at least February 2010, with some module timestamps dating to December 2007.[4] CrySyS Lab stated it was "certainly the most sophisticated malware we encountered during our practice; arguably, it is the most complex malware ever found."[4]

The Microsoft Forgery

Flame's capabilities were staggering. It could record audio through the computer's microphone, capture screenshots of email and instant messaging, log keystrokes, intercept Skype conversations, and turn infected computers into Bluetooth beacons that scanned for and downloaded contact information from nearby Bluetooth-enabled devices.[12] It used five different encryption methods, stored structured intelligence in an SQLite database, and could load additional attack modules on command after initial infection.[4] The platform was written in C++ with Lua scripting — an unusual choice that gave operators the flexibility to reconfigure missions without recompiling the core malware.[4]

Kaspersky estimated approximately 1,000 machines were infected, with 65% concentrated in Iran, and significant clusters in Israel, Palestine, Sudan, Syria, Lebanon, Saudi Arabia, and Egypt.[12] When Flame's existence was made public, the operators sent a "SUICIDE" command that caused the malware to delete all traces of itself from every infected system — a kill switch activated within days of public exposure.[4]

FORGING A MICROSOFT CERTIFICATE

Flame's most technically audacious feature was its propagation method. The malware was signed with a fraudulent certificate that appeared to come from Microsoft itself. The attackers identified a Microsoft Terminal Server Licensing Service certificate that used the weak MD5 hashing algorithm, then executed a novel variation of a chosen-prefix collision attack to produce a counterfeit copy.[13] This forged certificate allowed Flame to masquerade as a legitimate Windows Update, spreading across local area networks as if signed by Microsoft.[13]

The cryptographic attack was itself a breakthrough. While MD5 collision attacks had been demonstrated in 2008, Flame implemented a new variant that the cryptographic community had not previously seen in the wild.[13] It was, at the time, the most sophisticated cryptographic attack ever deployed in operational malware — and it worked. The implications were deeply unsettling: if a nation-state could forge Microsoft's own update mechanism, then the entire software supply chain was a potential attack surface.

RESOURCE 207 — PROVING THE CONNECTION

For weeks after Flame's discovery, the security community debated whether it was truly connected to Stuxnet or merely resembled it. On June 11, 2012, Kaspersky Lab ended the debate. Researchers discovered that an early version of Stuxnet (Stuxnet.a, dating to approximately June 2009) contained a module known as "Resource 207" — a 351,768-byte encrypted DLL file containing an executable called atmpsvcn.ocx that shared extensive code with Flame.[14]

The module functioned as a privilege escalation and network propagation tool within Stuxnet, but it was unmistakably Flame code embedded inside a Stuxnet payload. This proved that the Flame development team and the Stuxnet development team had collaborated directly — sharing components across what appeared to be independent malware platforms.[14] By 2010, when a newer version of Stuxnet was deployed, Resource 207 had been removed and replaced with different code — suggesting the teams had decoupled their development after the initial collaborative phase, each evolving their platforms independently.[14]

This was the first concrete evidence of what Chronicle researchers would later formalize as the GOSSIP GIRL model: a supra threat actor framework where independent teams share components, exploits, and infrastructure while maintaining separate codebases and operational mandates.[2]

GAUSS — FOLLOWING THE MONEY

In August 2012, Kaspersky discovered yet another member of the family. Gauss — named after a reference to the mathematician found in one of its main files — was a cyber espionage tool built on the same codebase as Flame but with a startling new capability: it targeted bank accounts.[15] The malware specifically harvested login credentials for several Lebanese banks, including the Bank of Beirut, Byblos Bank, BlomBank, FransaBank, and Credit Libanais, as well as Citibank and PayPal accounts.[15]

Gauss had infected approximately 2,500 machines, with the overwhelming majority in Lebanon.[16] The banking module was unprecedented for nation-state malware — credential theft of this kind was the domain of criminal hacking groups, not intelligence agencies. Kaspersky's senior researcher Roel Schouwenberg suggested the banking component was likely used for counterintelligence purposes: monitoring funding flows to specific individuals or groups, tracing financial networks supporting designated targets, or potentially disrupting operations by draining accounts.[15]

But Gauss's most tantalizing feature was its mysterious encrypted payload. The malware contained a heavily encrypted warhead that would only unlock on machines with a very specific — and still unknown — hardware and software configuration. The configuration itself generates the decryption key, meaning the payload was designed to execute only on its intended target. Despite years of effort by multiple research teams, Gauss's encrypted payload has never been cracked.[15] Whatever it was designed to do — and to whom — remains one of the unsolved mysteries of the cyber weapons era.

DUQU 2.0 — INSIDE THE WALLS

In early 2015, an engineer at Kaspersky Lab was testing a new security product on a company server when he noticed anomalous network traffic. The investigation that followed revealed something unprecedented: a nation-state adversary had been living inside Kaspersky's own corporate network for months.[17]

Spying on the Spies

The attackers had used a spear-phishing attack with a zero-day exploit to compromise an employee in Kaspersky's Asia-Pacific office. From there, they leapfrogged through the network using a second zero-day targeting a vulnerability in the Kerberos authentication protocol, gaining elevated privileges on domain controllers. A third zero-day was used to install the attack toolkit directly into kernel memory.[17] When Kaspersky identified the initial infection point, the attackers — apparently aware they'd been detected — wiped the mailbox and browsing history of patient zero within four hours, racing to eliminate evidence before analysts could reach it.[17]

The toolkit was a 19-megabyte modular platform with plugins for various reconnaissance and data theft activities, and it represented a quantum leap in stealth: Duqu 2.0 existed entirely in memory. It wrote nothing to disk, stored no files, left no conventional forensic artifacts. The malware survived only in the RAM of infected machines, persisting across reboots by re-infecting from a server that remained compromised.[17] This meant standard forensic tools — which scan files and disk artifacts — were blind to it.

The malware was signed with a legitimate digital certificate stolen from Foxconn — the Taiwanese electronics giant that manufactures hardware for Apple, Sony, and dozens of other global brands.[5] The use of a Foxconn certificate was a deliberate escalation: previous Duqu operations had used certificates stolen from smaller companies like C-Media. Targeting one of the world's largest electronics manufacturers signaled both capability and audacity — the attackers had penetrated Foxconn's infrastructure specifically to obtain signing credentials.[5]

THE P5+1 ANGLE

Kaspersky wasn't the only victim. When the company scanned its customer telemetry for related infections, they initially found only three other compromised locations — all hotels. It was only later that researchers discovered the common thread: every infected hotel had been a venue for P5+1 negotiations over Iran's nuclear program.[18]

The P5+1 — the five permanent members of the UN Security Council (US, UK, France, Russia, China) plus Germany — had been negotiating with Iran over its nuclear capabilities in a process that would eventually produce the JCPOA (Iran nuclear deal) in July 2015. The malware was discovered just weeks before the deal was finalized. Israel, which vehemently opposed the agreement, had been excluded from these negotiations.[18]

The strategic logic was stark. Various researchers have long suspected that while the U.S. and Israel collaborated on Stuxnet, Israel alone was behind the Duqu code.[17] The focused espionage on nuclear negotiations from which Israel was excluded would seem to confirm this — and it meant that a close U.S. ally was using cyber weapons derived from a joint U.S.-Israeli program to spy on the United States and its negotiating partners. Symantec, which independently confirmed Duqu 2.0's existence, found additional victims among its own customers — some of them in the United States.[17]

"Spying on cybersecurity companies is a very dangerous tendency," said Eugene Kaspersky, CEO of Kaspersky Lab. "Security software is the last frontier of protection for businesses and customers in the modern world, where hardware and network equipment can be compromised."[18]

GOSSIP GIRL — ANATOMY OF A SUPERGROUP

In April 2019, at the Kaspersky Security Analyst Summit in Singapore, Chronicle researchers Guerrero-Saade and Cutler presented their synthesis of a decade of discoveries. Working from leaked Five Eyes signals intelligence documents — including a CSEC (Canadian) presentation titled "Pay attention to that man behind the curtain" that listed threat actor cryptonyms — they traced a signature format linking the codename GOSSIPGIRL to Flame.[2]

From there, they reconstructed the architecture of what they called a Supra Threat Actor (STA): a meta-organization where multiple independent threat groups share a development framework enabling cross-platform compatibility. Droppers, payloads, and configuration files could be co-opted and instrumented by the closed-source tooling of other groups — a formalized collaborative development practice among apex threat actors.[2]

The GOSSIP GIRL umbrella, as they mapped it, encompassed four distinct threat actors:[2]

A DYNASTY SPANNING FIFTEEN YEARS

~2006–2007
Earliest Flame module timestamps date to December 2007. Flowershop ("Stuxshop") component found in early Stuxnet code suggests collaborative development beginning as early as 2006.[2]
JUNE 2009
Stuxnet.a deployed with Resource 207 — a Flame plugin embedded directly in the Stuxnet codebase. This is the earliest confirmed direct code-sharing between the Flame and Stuxnet teams.[14]
JUNE 2010
Stuxnet discovered by VirusBlokAda in Belarus. Resource 207 has been replaced in newer versions, suggesting the teams decoupled after initial collaboration. Stuxnet ultimately damages ~1,000 Iranian centrifuges at Natanz.[1]
APRIL 2011
Iranian authorities announce computers have been hit by a second digital attack they call the "Stars virus". Researchers later determine Stars was actually Duqu — its keylogger was embedded in a JPEG image of a Hubble telescope photograph of colliding galaxies.[3]
SEPT 2011
Duqu formally discovered by CrySyS Lab in Budapest. Boldizsár Bencsáth publishes 60-page technical report. Symantec confirms code-level connection to Stuxnet via the Tilded platform. F-Secure's systems initially classify it as Stuxnet.[7]
MAY 2012
Flame discovered by Kaspersky, CrySyS, and Iranian CERT simultaneously. 20MB platform found active since at least February 2010. CrySyS calls it "the most complex malware ever found." Operators deploy SUICIDE command within days.[4]
JUNE 2012
Resource 207 discovery. Kaspersky proves Stuxnet and Flame share code, establishing the collaborative development model. The Flame plugin in early Stuxnet is the smoking gun.[14]
AUG 2012
Gauss discovered targeting Lebanese banks. 2,500 machines infected. Encrypted payload remains uncracked. Kaspersky confirms shared codebase with Flame.[15]
~2014
Flame 2.0 compiled — though not discovered until 2019. Attackers used timestomping to disguise new samples as pre-suicide-command artifacts, but a compilation error revealed the true date. New encryption and obfuscation mechanisms deployed.[4]
EARLY 2015
Duqu 2.0 discovered inside Kaspersky's own networks. Three zero-day exploits. Memory-only persistence. Foxconn-stolen digital certificate. Also found at P5+1 negotiation hotel venues. Kaspersky calls it "a generation ahead" of any known APT.[6]
JULY 2015
JCPOA (Iran nuclear deal) signed — the very negotiations Duqu 2.0 was spying on. The deal limits Iran's enrichment capabilities — the same capabilities Stuxnet had physically sabotaged five years earlier.
APRIL 2019
Chronicle researchers formally identify GOSSIP GIRL as a supra threat actor at Kaspersky SAS in Singapore. Fourth member Flowershop revealed. The collaborative framework model is established.[2]

COULD AI BUILD THE NEXT DUQU?

The Duqu dynasty took years to develop. The custom OO-C framework, the novel MD5 collision attack against Microsoft certificates, the memory-only persistence architecture of Duqu 2.0 — each represented months or years of elite software engineering. The question for the current era is whether AI could compress that development timeline.

The 2026 cyber landscape suggests the answer is increasingly yes. The CrowdStrike 2025 Threat Hunting Report documented a 136% increase in cloud intrusions in the first half of 2025.[19] The CCAPAC Annual Report found that 82.6% of phishing emails now contain AI-generated elements.[20] Anthropic itself has flagged AI's potential to "automate sophisticated destructive cyber attacks."[21] Agentic AI cyberweapons are being described as the tool of choice for state-sponsored attackers targeting critical infrastructure.[22]

What made GOSSIP GIRL exceptional was not raw coding skill — it was systems engineering at scale: modular architecture enabling cross-team collaboration, custom frameworks for operational security, novel cryptographic attacks for supply chain compromise, and memory-only persistence for forensic evasion. Each of these capabilities is precisely the type of complex, multi-step technical challenge that modern AI systems are increasingly capable of assisting with.

Consider: Duqu's custom OO-C framework was remarkable because it suggested decades of institutional software development. Today, an LLM could generate equivalent abstraction layers in hours. Flame's MD5 collision attack required deep cryptographic expertise. Modern AI systems can identify cryptographic weaknesses and generate proof-of-concept code. Duqu 2.0's memory-only architecture required intimate knowledge of Windows kernel internals. AI-assisted vulnerability research is already accelerating zero-day discovery.

The Duqu dynasty was the product of perhaps the most well-resourced cyber weapons programs in history — backed by the intelligence agencies of at least two nations, with access to stolen digital certificates, zero-day exploits, and targets of the highest strategic value. The terrifying implication of AI-accelerated development is that the barrier to entry is dropping. What once required Unit 8200 and the NSA may soon require only a capable team with the right AI tools.

BOTTOM LINE

The Duqu dynasty is the most documented case study in collaborative nation-state cyber weapons development. Across four threat actors, three generations of malware, at least eight zero-day exploits, and a target set spanning from Iranian nuclear facilities to European hotel conference rooms, the GOSSIP GIRL framework demonstrated that the future of cyber warfare is modular, collaborative, and institutional.[2]

The strategic trajectory is unmistakable. Stuxnet sabotaged centrifuges. Duqu gathered the intelligence to enable that sabotage. Flame surveilled the entire theater. Gauss followed the money. And when the diplomats sat down to negotiate a resolution, Duqu 2.0 was sitting in the hotel network listening to every keystroke. The target — Iran's nuclear program — has not changed in fifteen years. Only the tools have evolved.

What has changed is the speed at which such tools can be developed. The custom frameworks and novel cryptographic attacks that defined GOSSIP GIRL were products of year-long development cycles by elite teams. AI is compressing those cycles. The CrySyS Lab discovery model — an academic research team in Budapest unraveling nation-state malware — may itself be under threat, as AI-assisted obfuscation makes detection exponentially harder while AI-assisted development makes deployment exponentially faster.

The Duqu dynasty was not just a weapons program. It was a proof of concept for institutionalized, multi-agency, cross-national collaborative cyber warfare. Every major power watched. Every major power learned. The question is no longer whether this model will be replicated — it is how many such programs are already running, with AI as the new force multiplier, that we haven't discovered yet.

The entire code of this platform is some of the best we have seen ever. It is incredibly well written. Almost no mistakes anywhere.

— Costin Raiu, Director, Kaspersky Global Research and Analysis Team, on Duqu 2.0, 2015[17]

References & Source Material

  1. [1]Kim Zetter, "Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon," Crown Publishing, 2014
  2. [2]Juan Andres Guerrero-Saade & Silas Cutler, "Who is GOSSIPGIRL? Revisiting the O.G. Threat Actor Supergroup," Chronicle Blog, April 2019
  3. [3]"Duqu," Wikipedia — overview of discovery, technical analysis, C&C infrastructure, and self-destruct timer (accessed 13 Mar 2026)
  4. [4]"Flame (malware)," Wikipedia — discovery, capabilities, SUICIDE command, module timestamps (accessed 13 Mar 2026)
  5. [5]Kim Zetter, "Attackers Stole Certificate From Foxconn to Hack Kaspersky With Duqu 2.0," WIRED, June 2015
  6. [6]Kaspersky Lab, "The Duqu 2.0 Targeted Attacks," Technical Report, June 2015
  7. [7]Symantec, "W32.Duqu — The Precursor to the Next Stuxnet (Version 1.4)," Technical Whitepaper, November 2011
  8. [8]Boldizsár Bencsáth et al., "Duqu: A Stuxnet-like malware found in the wild," CrySyS Lab Technical Report, October 2011
  9. [9]Symantec, "Duqu designed to gather intelligence on industrial control systems," press coverage and analysis, October 2011
  10. [10]"Mysterious Wiper malware possibly connected to Stuxnet and Duqu," Computerworld / CSO Online, August 2012 — describes Tilded platform naming
  11. [11]Kaspersky Lab, "The mystery of Duqu Framework solved," Securelist, March 2012 — identifies custom OO-C framework
  12. [12]Kim Zetter, "Meet Flame, The Massive Spy Malware Infiltrating Iranian Computers," WIRED, May 2012
  13. [13]"Flame was signed with a fraudulent certificate purportedly from Microsoft," Microsoft Security Advisory 2718704, June 2012
  14. [14]Kaspersky Lab, "Resource 207: Kaspersky Lab Research Proves that Stuxnet and Flame Developers are Connected," Press Release, June 2012
  15. [15]Kim Zetter, "Flame and Stuxnet Cousin Targets Lebanese Bank Customers, Carries Mysterious Payload," WIRED, August 2012
  16. [16]Kaspersky Lab, "Gauss: Abnormal Distribution," Securelist Technical Analysis, August 2012
  17. [17]Kim Zetter, "Kaspersky Finds New Nation-State Attack — In Its Own Network," WIRED, June 2015
  18. [18]Samuel Gibbs, "Duqu 2.0: computer virus 'linked to Israel' found at Iran nuclear talks venue," The Guardian, June 2015
  19. [19]CrowdStrike, "2025 Threat Hunting Report: AI Becomes a Weapon and a Target," December 2025
  20. [20]"The State of Cyber Warfare in 2026: Nation-State Attacks, AI Weapons, and the New Digital Battlefield," The Cyber Express, March 2026
  21. [21]"How AI will transform cybersecurity in 2025 — and supercharge cybercrime," ZDNet, January 2025 — notes Anthropic flagging AI's potential for automated destructive cyber attacks
  22. [22]"Cloud of War: The AI Cyber Threat to U.S. Critical Infrastructure," American Security Project, October 2025
CONNECTIONS
ZOOM OUT