Wednesday, October 22, 2014
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
LG Display Reports Strong Third Quarter 2014 Results
Moto 360 Android Wear Updated
Canon Announces the Second-Generation EOS C100 Mark II Digital Video Camera
G.Skill Introduces The Phoenix Blade 480GB PCIe SSD
Microsoft Is Rolling Out First New Windows 10 Preview Build
Yahoo Reports High Revenue and Profit
New Samsung Galaxy S5 'Plus' Released With Faster Processor
Google, Facebook And Comcast Spend The Most On Lobbying
Active Discussions
Copied dvd's say blank in computer only
How to generate lots of different CDs quickly
Yamaha CRW-F1UX
help questions structure DVDR
Made video, won't play back easily
Questions durability monitor LCD
Questions fungus CD/DVD Media, Some expert engineer in optical media can help me?
CD, DVD and Blu-ray burning for Android in development
 Home > News > General Computing > Kaspers...
Last 7 Days News : SU MO TU WE TH FR SA All News

Monday, May 28, 2012
Kaspersky Reveals New Advanced Cyber Threat


Kaspersky Lab has discovered a highly sophisticated malicious program that is actively being used as a cyber weapon attacking entities in several countries.

The research firm said on Monday that the complexity and functionality of the malicious program exceeded those of all other cyber menaces known.

The malware was discovered by Kaspersky Lab's experts during an investigation prompted by the International Telecommunication Union (ITU). The malicious program, detected as Worm.Win32.Flame by Kaspersky Lab's security products, is designed to carry out cyber espionage. It can steal information, including but not limited to computer display contents, information about targeted systems, stored files, contact data and even audio conversations.

The independent research was initiated by ITU and Kaspersky Lab after a series of incidents with another, still unknown, destructive malware program - codenamed Wiper - which deleted data on a number of computers in the Western Asia region. This particular malware is yet to be discovered, but during the analysis of these incidents, Kaspersky Lab?s experts, in coordination with ITU, came across a new type of malware, now known as Flame. Preliminary findings indicate that this malware has been "in the wild" for more than two years - since March 2010. Due to its extreme complexity, plus the targeted nature of the attacks, no security software detected it.

Although the features of Flame differ compared with those of previous notable cyber weapons such as Duqu and Stuxnet, the geography of attacks, use of specific software vulnerabilities, and the fact that only selected computers are being targeted all indicate that Flame belongs to the same category of super-cyberweapons.

Commenting on uncovering Flame, Eugene Kaspersky, CEO and co-founder of Kaspersky Lab, said: "The risk of cyber warfare has been one of the most serious topics in the field of information security for several years now. Stuxnet and Duqu belonged to a single chain of attacks, which raised cyberwar-related concerns worldwide. The Flame malware looks to be another phase in this war, and it?s important to understand that such cyber weapons can easily be used against any country. Unlike with conventional warfare, the more developed countries are actually the most vulnerable in this case."

The primary purpose of Flame appears to be cyber espionage, by stealing information from infected machines. Such information is then sent to a network of command-and-control servers located in many different parts of the world. The diverse nature of the stolen information, which can include documents, screenshots, audio recordings and interception of network traffic, makes it one of the most advanced and complete attack-toolkits ever discovered. The exact infection vector has still to be revealed, but it is already clear that Flame has the ability to replicate over a local network using several methods, including the same printer vulnerability and USB infection method exploited by Stuxnet.

Alexander Gostev, Chief Security Expert at Kaspersky Lab, commented: "The preliminary findings of the research, conducted upon an urgent request from ITU, confirm the highly targeted nature of this malicious program. One of the most alarming facts is that the Flame cyber-attack campaign is currently in its active phase, and its operator is consistently surveilling infected systems, collecting information and targeting new systems to accomplish its unknown goals."

According to information known so far, Flame consists of multiple modules and is made up of several megabytes of executable code in total - making it around 20 times larger than Stuxnet.

The initial point of entry if Falme is unknown. Security experts have some suspicions about possible use of the MS10-033 vulnerability, but they cannot confirm this now.


Previous
Next
Samsung Galaxy S III Sales Begin        All News        LG Display Develops First 5-inch Full HD LCD Panel For Smartphones
Google Apps Receives ISO Certification     General Computing News      Bing Maps Now Using Nokia Backend Services for Traffic and Geocoding

Get RSS feed Easy Print E-Mail this Message

Related News
Kaspersky Identifies New Asia-based Hacking Group
Dropbox, WordPress Used To Spread Malware
Microsoft Says Viruses Are Back On The Rise
Kaspersky Says Hacker Group Has Been Targeting Online Games
First Targeted Attack Utilising Malware for Android Devices Reported
Cyber Attack Targets Nato, Government Websites
Stuxnet Roots Found Back in 2005
Java Exploit Behind "Red October" Cyber Attacks
FTC Warns Small Businesses Of Spam Email
Kaspersky Says 'Red October' Virus Has Been Targeting Diplomatic and Government Agencies
Kaspersky Develops Secure OS For Industrial Control
Kaspersky Discovers New version Of Flams Virus

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2014 - All rights reserved -
Privacy policy - Contact Us .