CIOs and their chief security officers will be forced to reassess their online strategies in light of the discovery of Flame, a new piece of malware larger and more sophisticated than the Stuxnet virus that disabled Iranian nuclear facilities, and described by one expert as “an industrial vacuum cleaner for sensitive information.” They are also likely to be called upon by their boards to explain what the virus means to their companies.
Russian security firm Kaspersky Labs told the BBC they believed the malware, known as Flame, had been operating since August 2010.The company said it believed the attack was state-sponsored, but could not be sure of its exact origins. They described Flame as “one of the most complex threats ever discovered”.
Research into the attack was carried out in conjunction with the UN’s International Telecommunication Union. They had been investigating another malware threat, known as Wiper, which was reportedly deleting data on machines in western Asia. In the past, targeted malware – such as Stuxnet – has targeted nuclear infrastructure in Iran. Others like Duqu have sought to infiltrate networks in order to steal data. This new threat appears not to cause physical damage, but to collect huge amounts of sensitive information.
Iran’s National Computer Emergency Response Team posted a security alert stating that it believed Flame was responsible for “recent incidents of mass data loss” in the country. The malware code itself is 20MB in size – making it some 20 times larger than the Stuxnet virus. The researchers said it could take several years to analyze. The size and sophistication of Flame suggested it was not the work of independent cybercriminals, and more likely to be government-backed.
This is an extremely advanced attack. It is more like a toolkit for compiling different code based weapons than a single tool. It can steal everything from the keys you are pressing to what is on your screen to what is being said near the machine. It also has some very unusual data stealing features including reaching out to any Bluetooth enabled device nearby to see what it can steal. The malware is capable of recording audio via a microphone, before compressing it and sending it back to the attacker. It is also able to take screenshots of on-screen activity, automatically detecting when “interesting” programs – such as email or instant messaging – were open. Among the countries affected by the attack are Iran, Israel, Sudan, Syria, Lebanon, Saudi Arabia and Egypt.
Well, so much for the holiday post glow…it is gonna be a busy Tuesday!