(Before It's News)
The Iranian Computer Emergency Response Team (MAHER) recently claimed to have found a new version of Stuxnet attacking the country. This new virus, classified as 'Skywiper' or 'Flame', (the name “Flamer” comes from one of the attack modules) soon went global, with Kaspersky Lab in the US and CrySyS Lab of the Budapest University of Technology and Economics confirming the discovery. Experts believe the complexity and functionality of this newly discovered malware exceed that of all others known to date.
Described as: "A sophisticated malicious program that is actively being used as a cyber weapon attacking entities in several countries.' Kapersky Labs also revealed that part of the Flame program code is almost identical to code found in a 2009 version of Stuxnet.
Flame is designed to carry out 'cyber espionage', stealing computer display contents, stored files, contact data and even audio conversations.
Identified as Worm.Win32.Flame by Kaspersky Lab’s security products, the malicious program then sends this information to 'a network of command-and-control servers located in many different parts of the world.'
The virus replicates itself over a local network using several infection methods, along with the identical printer and USB vulnerabilities exploited by Stuxnet.
More complex in nature, initially none of the dozens of commercial anti virus products on the market could detect the malicious components, prompting fears the malware has been active for more than two years.
Highlights of 'Flame' capabilities
-
Distribution via removable medias
-
Distribution through local networks
-
Network sniffing, detecting network resources and collecting lists of vulnerable passwords
-
Scanning the disk of infected system looking for specific extensions and contents
-
Creating series of user’s screen captures when some specific processes or windows are active
-
Using the infected system’s attached microphone to record the environment sounds
-
Transferring saved data to control servers
-
Using more than 10 domains as C&C servers
-
Establishment of secure connection with C&C servers through SSH and HTTPS protocols
-
Bypassing tens of known antiviruses, anti malware and other security software
-
Capable of infecting Windows Xp, Vista and 7 operating systems
-
Infecting large scale local networks
Further info
http://en.wikipedia.org/wiki/Flame_(malware)