Skip to main content

Flame virus points to more malware- Kaspersky Lab's analysis


Kaspersky Lab revealed the results of a new research pertaining to the discovery of the widely reported, sophisticated, nation-state sponsored Flame cyber-espionage campaign. An official statement reveals that during the research carried out by Kaspersky Lab together with International Telecommunication Union’s cyber security executing arm -- IMPACT, CERT-Bund/BSI and Symantec, several Command and Control (C&C) servers that were used by Flame’s creators were looked into in detail. According to the official statement, analysing the C&C servers shed light on “groundbreaking facts about Flame”.

Following the analysis, traces of three yet undiscovered malicious programs were found, and it was discovered that the development of the Flame platform goes back to December 2006.
The official statement puts forth the major findings of the analysis as follows:
  • The development of Flame’s Command and Control platform started as early as December 2006.
  • The C&C servers were disguised to look like a common Content Management System, to hide the true nature of the project from hosting providers or random investigations.
  • The servers were able to receive data from infected machines using four different protocols; only one of them servicing computers attacked with Flame.
  • The existence of three additional protocols not used by Flame provides proof that at least three other Flame-related malicious programs were created; their nature is currently unknown.
  • One of these Flame-related unknown malicious objects is currently operating in the wild.
  • There were signs that the C&C platform was still under development; one communication scheme named “Red Protocol” is mentioned but not yet implemented.
  • There is no sign that the Flame C&Cs were used to control other known malware such as Stuxnet or Gauss.
The widely reported Flame cyber-espionage campaign was originally discovered in May 2012 by Kaspersky Lab during an investigation initiated by the International Communication Union. On the discovery of the campaign, ITU-IMPACT got things running quickly and issued an alert to its 144 member nations, along with the appropriate remediation and cleaning procedures.
The findings add, “The complexity of the code and confirmed links to developers of Stuxnet all point to the fact that Flame is yet another example of a sophisticated nation-state sponsored cyber operation. Originally it was estimated that Flame started operations in 2010, but the first analysis of its Command and Control infrastructure (covered by at least 80 known domains names) shifted this date two years earlier.”

The findings in this particular investigation are based on the analysis of the content that which was retrieved from several C&C servers used by Flame. Interestingly, it has been revealed that the information was recovered despite the fact that Flame’s control infrastructure went offline immediately after Kaspersky Lab disclosed the existence of malware. “All servers were running the 64-bit version of the Debian operating system, virtualized using OpenVZ containers. Most of the servers’ code was written in the PHP programming language. Flame’s creators used certain measures to make the C&C server look like an ordinary Content Management System, in order to avoid attention from the hosting provider,” it added.

Reportedly, the encryption methods that were used were sophisticated, ensuring that no one, but the attackers, could receive the data uploaded from infected machines. The analysis of the scripts used to handle data transmissions to the victims revealed four communication protocols, and only one of them was compatible with Flame. It means that at least three other types of malware used these Command and Control servers. There is enough evidence to prove that at least one Flame-related malware is operating in the wild. These unknown malicious programs are yet to be discovered.

Worryingly, the analysis revealed that there are signs revealing that the platform is still in the process of development, as a new and yet unimplemented protocol called the 'Red Protocol' was found on the servers. The latest modification of the servers’ code was made on May 18, 2012 by one of the programmers.

“It was problematic for us to estimate the amount of data stolen by Flame, even after the analysis of its Command and Control servers. Flame’s creators are good at covering their tracks. But one mistake of the attackers helped us to discover more data that one server was intended to keep. Based on this we can see that more than five gigabytes of data was uploaded to this particular server a week, from more than 5,000 infected machines. This is certainly an example of cyber espionage conducted on a massive scale,” commented Alexander Gostev, Chief Security Expert, Kaspersky Lab.

Comments

Popular posts from this blog

The Return of Trump: What India's Economy and Job Market Can Expect

Donald Trump has made a comeback, winning the U.S. presidential election once again. With his return to the White House, there are many questions about how his policies will impact India's economy, especially regarding U.S.-based jobs and trade relations. Trump's previous tenure was characterized by his "America First" agenda, which significantly influenced global trade, immigration, and outsourcing dynamics. In this blog, we explore the potential advantages and challenges India may face under Trump's renewed leadership. 1. H-1B Visa and Immigration Policies: A Renewed Challenge During his previous term, Trump tightened immigration rules, especially concerning the H-1B visa program. This program is crucial for India's IT sector, which relies on sending skilled professionals to the U.S. What We Can Expect : Stricter Visa Norms : Trump's administration is likely to continue enforcing strict H-1B visa policies. This could mean increased scrutiny, higher rejec

Navigating the Depths: Understanding, Treating, and Preventing Pulmonary Embolism

Pulmonary embolism (PE) is a critical medical condition that demands a comprehensive exploration of its intricacies. In this blog post, we will delve into the causes, diagnostic procedures, treatment options, and preventative strategies to shed light on this often life-threatening occurrence. Unveiling the Causes of Pulmonary Embolism :  1. Deep Vein Thrombosis (DVT): PE often originates from deep vein thrombosis, where blood clots in the deep veins, typically in the legs, can break loose and travel to the lungs.  2. Surgical Procedures and Trauma: Surgery and traumatic injuries can elevate the risk of clot formation, especially during periods of immobilization in the recovery phase. 3. Lifestyle Factors: Obesity, smoking, and sedentary habits contribute to a pro-thrombotic state, increasing the likelihood of DVT and subsequent PE. 4. Genetic and Hormonal Factors: Inherited conditions affecting blood clotting, hormonal contraceptives, and pregnancy can predispose individuals to pulmona

The State of Quantum Computing in 2024: Where Are We Now?

  Quantum computing is one of the most exciting and rapidly advancing fields in technology today. As we step into 2024, it’s clear that quantum computing is no longer a distant dream but a rapidly evolving reality. However, the journey from theoretical models to practical applications is still ongoing. So, where do we stand with quantum computing today? Let’s explore the current landscape, the breakthroughs, and what lies ahead. 1. The Hardware Frontier: Scaling Up Qubits One of the most critical aspects of quantum computing is the hardware itself. Unlike classical computers, which use bits to represent data as 0s and 1s, quantum computers use  qubits  that can exist in multiple states simultaneously, thanks to the principles of  superposition  and  entanglement . Recent Hardware Advancements IBM  remains a leader in quantum hardware, having recently introduced its new  “Condor” quantum processor , which boasts over  1,121 qubits . This is a significant leap from their earlier processo

Embracing the AI Revolution: Redefining Software Development

 In the ever-evolving landscape of technology, a seismic shift is underway—a revolution driven by the fusion of artificial intelligence (AI) and software development. Envisioning this future is not just about imagining possibilities but understanding the profound impact it will have on how we create, innovate, and interact with technology. A Journey Through Programming Languages To appreciate the transformative potential of AI in software development, let's take a moment to reflect on the historical evolution of programming languages—the bedrock upon which modern computing is built. 1. Machine Language : In the early days of computing, programmers communicated with machines through raw binary instructions—machine language. This rudimentary form of programming was laborious and error-prone, requiring an intimate understanding of the computer's architecture. 2. Assembly Language : The introduction of assembly language provided a symbolic representation of machine language instruc

The Human Edge: Navigating Corporate Success in the Era of AI

   In the rapidly evolving landscape of artificial intelligence, a crucial question arises: What distinctive strengths do humans bring to the corporate realm that technology struggles to replicate? This exploration delves deep into the intricacies of human capabilities, unraveling a blueprint for organizations eager to leverage these strengths for sustained corporate success amidst the rise of AI. The Power of Creative Problem-Solving: Nurturing a Culture of Innovation In a world increasingly dominated by algorithms, the human touch remains unparalleled in creative problem-solving. Empowering employee creativity through platforms, cross-functional collaboration, and recognition programs fosters an environment where humans thrive, bringing imaginative solutions rooted in intuition, adaptability, and a depth of experience that AI struggles to match. Emotional Intelligence in Leadership: Building Empathetic and Effective Leaders Leadership extends beyond mere decision-making, encompassing

Nokia X Android smartphone with dual sim to arrive in India on March 10 for Rs 8,500

Nokia’s Android smartphone, the Nokia X will be available in India on 15 March and is priced at Rs 8,500. The smartphone is already listed online on The Mobile Store’s website . Currently the date and the price of the smartphone have been removed from the online site. Nokia had announced three Android smartphones as part of the X series at the Mobile World Congress last month. The devices will be known as the X, X+ and XL and Nokia had said at the time of the launch that the smartphones would be available ‘very soon’ in India. Nokia also said that the Nokia X would start retailing for 89 euros (approx Rs 7,600), the X+ for 99 euros (approx Rs 8,400) and would hit stores in Q2 this year.