CIOs and their chief security officers will be forced to reassess their online strategies in light of the discovery of Flame, a new piece of malware larger and more sophisticated than the Stuxnet virus that disabled Iranian nuclear facilities, and described by one expert as “an industrial vacuum cleaner for sensitive information.” They are also likely to be called upon by their boards to explain what the virus means to their companies.

33 15 15 fire flame
Flame, a complex targeted cyber-attack that collected private data from countries such as Israel and Iran has been uncovered, researchers have said.

Russian security firm Kaspersky Labs told the BBC they believed the malware, known as Flame, had been operating since August 2010.The company said it believed the attack was state-sponsored, but could not be sure of its exact origins. They described Flame as “one of the most complex threats ever discovered”.

Research into the attack was carried out in conjunction with the UN’s International Telecommunication Union. They had been investigating another malware threat, known as Wiper, which was reportedly deleting data on machines in western Asia. In the past, targeted malware – such as Stuxnet – has targeted nuclear infrastructure in Iran. Others like Duqu have sought to infiltrate networks in order to steal data. This new threat appears not to cause physical damage, but to collect huge amounts of sensitive information.

60531995 605319941
What does it do? Once a system is infected, Flame begins a complex set of operations, including sniffing the network traffic, taking screenshots, recording audio conversations and intercepting the keyboard. More than 600 specific targets were hit ranging from individuals, businesses, academic institutions and government systems.

Iran’s National Computer Emergency Response Team posted a security alert stating that it believed Flame was responsible for “recent incidents of mass data loss” in the country. The malware code itself is 20MB in size – making it some 20 times larger than the Stuxnet virus. The researchers said it could take several years to analyze. The size and sophistication of Flame suggested it was not the work of independent cybercriminals, and more likely to be government-backed.

This is an extremely advanced attack. It is more like a toolkit for compiling different code based weapons than a single tool. It can steal everything from the keys you are pressing to what is on your screen to what is being said near the machine. It also has some very unusual data stealing features including reaching out to any Bluetooth enabled device nearby to see what it can steal. The malware is capable of recording audio via a microphone, before compressing it and sending it back to the attacker. It is also able to take screenshots of on-screen activity, automatically detecting when “interesting” programs – such as email or instant messaging – were open. Among the countries affected by the attack are Iran, Israel, Sudan, Syria, Lebanon, Saudi Arabia and Egypt.

220px dancingflames
Kaspersky’s first recorded instance of Flame is in August 2010, although it said it is highly likely to have been operating earlier. Once the initial Flame malware has infected a machine, additional modules can be added to perform specific tasks – almost in the same manner as adding apps to a smartphone.

Well, so much for the holiday post glow…it is gonna be a busy Tuesday!

😉

http://blogs.wsj.com/cio/2012/05/29/the-morning-download-flame-raises-corporate-cyber-espionage-stakes/?mod=google_news_blog

http://www.bbc.co.uk/news/technology-18238326