A massive, highly 
sophisticated piece of malware has been newly found infecting systems in
 Iran and elsewhere and is believed to be part of a well-coordinated, 
ongoing, state-run cyber-espionage operation.
The Flame computer virus not 
only stole large quantities of information from various Iranian 
government agencies, but apparently even disrupted its oil exports by 
shutting down oil terminals, information security firm Symantec Israel 
said yesterday.
The Flame virus recently found 
in Iran could be used to infect other countries, according to the 
International Telecommunications Union. As the United Nations agency 
charged with helping members protect their data networks, the ITU plans 
to issue a warning about the danger of Flame.
Iran's National Computer 
Emergency Response Team (Maher) said in a statement that the detection 
and clean-up tool was finished in early May and is now ready for 
distribution to organisations at risk of infection.Flame was discovered 
after the UN's International Telecommunications Union asked for help 
from security firms to find out what was wiping data from machines 
across the Middle East.An investigation uncovered the sophisticated 
malicious programme which, until then, had largely evaded detection.
The virus is about 20 times the 
size of Stuxnet, malware that targeted the controls of an Iranian 
nuclear facility. The largest concentration of infected machines is in 
Iran, followed by the Palestinian-controlled West Bank, Sudan, Syria, 
Lebanon, Saudi Arabia, and Egypt.
According to the crysys report on sKyWIper (aka Flame):
sKyWIper
 has very advanced functionality to steal information and to propagate. 
Multiple exploits and propagation methods can be freely configured by 
the attackers. Information gathering from a large network of infected 
computers was never crafted as carefully as in sKyWIper. The malware is 
most likely capable to use all of the computers’ functionalities for its
 goals. It covers all major possibilities to gather intelligence, 
including keyboard, screen, microphone, storage devices, network, wifi, 
Bluetooth, USB and system processes.
Flame is a Swiss Army Knife of 
malware in the sense that it can intercept everything imaginable, but it
 is not a pile of existing malware code thrown together. It is very 
cleverly crafted. Like Stuxnet, it has multiple propagation vectors – 
USB keys, printer sharing, and domain controller rights to name a few.
No security vendor has pointed 
out a single country or group as being responsible for Flame's 
creation.The central matter of contention at the moment is whether the 
malware was made by a private group or a nation state.

 
 
No comments:
Post a Comment