Subscribe free to our newsletters via your
. Military Space News .




CYBER WARS
Flame virus a new age cyber spy tool
by Staff Writers
San Francisco (AFP) May 30, 2012


The Flame computer virus that smoldered undetected for years in Middle Eastern energy facilities confirmed fears that the world has entered a new age of cyber espionage and sabotage.

Internet defenders on Wednesday were tearing into freshly exposed Flame malware (malicious software) that could be adapted to spread to critical infrastructures in countries around the world.

While the components and tactics of Flame were considered old school, the gigantic virus's interchangeable software modules and targeted nature were evidence that malware is a potent weapon in the Internet era.

"We are seeing much more specific types of malware and attacks," said McAfee Labs director of security research David Marcus.

"When you talk about a situation where the attacker knows the victim and tailors the malware for the environment it jumps out," he said. "That speaks to good reconnaissance and an attacker who knows what they are doing."

Gathering intelligence on targets and then crafting viruses to exploit specific networks as well as the habits of people using them is "certainly in vogue" and is an attack style heralded by the Stuxnet malware, Marcus said.

Stuxnet, which was detected in July 2010, targeted computer control systems made by German industrial giant Siemens and commonly used to manage water supplies, oil rigs, power plants and other critical infrastructure.

Most Stuxnet infections were discovered in Iran, giving rise to speculation it was intended to sabotage nuclear facilities there, especially the Russian-built atomic power plant in the southern city of Bushehr.

Suspicion fell on Israel and the United States, which have accused Iran of seeking to develop a weapons capability under the cover of a civilian nuclear drive. Tehran denies the charges.

"Stuxnet and Duqu belonged to a single chain of attacks, which raised cyberwar-related concerns worldwide," said Eugene Kaspersky, founder of Kaspersky Lab, which uncovered Flame.

"The Flame malware looks to be another phase in this war, and it's important to understand that such cyber weapons can easily be used against any country."

Flame malware was orders of magnitude larger than Stuxnet and protected by multiple layers of encryption.

It appears to have been "in the wild" for two years or longer and prime targets so far have been energy facilities in the Middle East.

High concentrations of compromised computers were found in the Palestinian West Bank, Hungary, Iran, and Lebanon. Additional infections have been reported in Austria, Russia, Hong Kong, and the United Arab Emirates.

Compromised computers included many being used from home connections, according to security researchers who were looking into whether reports of infections in some places resulted from workers using laptops while traveling.

While Stuxnet was crafted to do real-world damage to machinery, Flame was designed to suck information from computer networks and relay what it learned back to those controlling the virus.

Flame can record keystrokes, capture screen images, and eavesdrop using microphones built into computers.

In an intriguing twist, the malware can also use Bluetooth capabilities in machines to connect with smartphones or tablets, mining contact lists or other information, according to security researchers.

"There is lot of intelligence gathering and espionage-like behavior from the malware," Marcus said. "You can turn that to target any industry you want.

"It looks like the infection spread is specific to Middle East, but malware is indiscriminate in a lot of things so it can jump," he continued.

Marcus advised companies to not only keep network software up to date but to ratchet up security settings because threats such as Flame are carefully crafted to "fly under the radar."

For example, Flame reportedly sneaked back out to the Internet by activating a seemingly innocuous Internet Explorer online browsing session.

Geographically targeted cyber espionage and even modular components in viruses have been around for years, Rik Ferguson of security firm Trend Micro said in his blog at countermeasures.trendmicro.eu.

Flame stands out for being a malware behemoth of nearly 20 megabytes and for its use of Bluetooth capabilities, according to Ferguson, who branded the malware a tool, not a weapon.

"You can't get around the fact that the thing is gigantic," Marcus said. "Someone went to a lot of trouble to really confound researchers. We are going to be ripping this sucker apart for a long time to figure everything it was doing."

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
White House, industry joins to secure cyberspace
Washington (AFP) May 30, 2012
The White House and industry groups Wednesday unveiled new initiatives to combat so-called "botnets," or networks of computers controlled by hackers through virus infections. The cybersecurity partnership includes US government agencies including the Department of Homeland Security and the Industry Botnet Group, a group of nine trade associations and nonprofit organizations. At a White H ... read more


CYBER WARS
Rafael seeks to boost range of Iron Dome

Lockheed Martin Delivers Core Structure for Fourth SBIRS Satellite

NATO activates missile shield, reaches out to Russia

NATO activates missile shield despite Russian anger

CYBER WARS
Akash missile fails a routine test flight

Pakistan tests nuclear-capable missile

Taiwan deploys anti-China missiles: report

Rafael seeks missile shield for helicopters

CYBER WARS
Northrop Grumman, L-3 MAS to Join Forces on Unmanned System for Canadian Security

US drones kill 9 militants in Pakistan: officials

AeroVironment Introduces Digital Wasp AE Small Unmanned Aircraft System

A new imaging system produces 3D models of monuments using unmanned aircraft

CYBER WARS
New Mobile Antenna from ASC Signal Designed For Rapid Deployment by Defense and Commercial Users

Researchers Improve Fast-Moving Mobile Networks

Second AEHF Military Communications Satellite Launched

Fourth Boeing-built WGS Satellite Accepted by USAF

CYBER WARS
Raytheon unveils reconnaissance system prototype to Canadian Army

Congress to spend more on tanks than US military wants

Pre-qualified modular app ready platform gets apps promptly to the battlefield

Raytheon awarded $57.8 million Phalanx contract

CYBER WARS
India's army chief retires after clash with govt

BAE Systems says to cut 620 jobs in Britain

Treatment of Vietnam vets 'a national shame': Obama

$3B in training deals for European firms

CYBER WARS
China urges US to respect its interests in Asia

Japan must lock door against China: Tokyo governor

Commentary: Alarm bells in the U.S.

Obama's Memorial Day message: troops are coming home

CYBER WARS
Wyss Institute develops nanodevice manufacturing strategy using DNA 'building blocks'

First direct observation of oriented attachment in nanocrystal growth

Stunning image of smallest possible 5 rings

Sensing the infrared: Researchers improve IR detectors with single-walled carbon nanotubes




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement