Subscribe free to our newsletters via your
. GPS News .




CYBER WARS
Flame spy virus gets order to vanish: experts
by Staff Writers
San Francisco (AFP) June 10, 2012


US computer security researchers said Sunday that the Flame computer virus that smoldered undetected for years in Middle Eastern energy facilities has gotten orders to vanish, leaving no trace.

Anti-virus company Symantec said in a blog post that late last week, some Flame "command-and-control servers sent an updated command to several compromised computers."

"This command was designed to completely remove (Flame) from the compromised computers."

Flame malicious software (malware) appears to have been "in the wild" for two years or longer and prime targets so far have been energy facilities in the Middle East, especially in Iran.

The discovery of Flame immediately sparked speculation that it had been created by US and Israeli security services to steal information about Iran's controversial nuclear drive.

Kaspersky Lab, one of the world's biggest producers of anti-virus software, said the Flame virus was "about 20 times larger than Stuxnet," the worm which was discovered in June 2010 and used against the Iranian nuclear program.

High concentrations of computers compromised by Flame were also found in Lebanon, the West Bank and Hungary. Additional infections have been reported in Austria, Russia, Hong Kong and the United Arab Emirates.

Compromised computers included many being used from home connections, according to security researchers who were looking into whether reports of infections in some places resulted from workers using laptops while traveling.

While the components and tactics of Flame were considered old-school, the gigantic virus's interchangeable software modules and targeted nature were evidence that malware is a potent weapon in the Internet era.

Computers infected with malware are typically programmed to reach out on the Internet to get updated orders from command servers controlled by hackers.

In this case, it appeared that Flame masters gave an order for the malware to vanish, leaving behind no trail that investigators might be able to follow or clues to its origin.

The self-destruct command was evidently sent after Flame was exposed and investigations commenced.

Infected computers that got the command went on to delete an array of files and then cram disks with random characters to thwart recovery of original code, according to security researchers.

It was unknown how many infected computers received the self-destruct command.

Flame was designed to suck information from computer networks and relay what it learned back to those controlling the virus. It can record keystrokes, capture screen images, and eavesdrop using microphones built into computers.

In an intriguing twist, the malware can also use Bluetooth capabilities in machines to connect with smartphones or tablets, mining contact lists or other information, according to security researchers.

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
'Anonymous' hackers protest over India Internet laws
New Delhi (AFP) June 9, 2012
Indian demonstrators supporting the global hacking movement Anonymous took to the streets on Saturday to protest against what they consider growing government censorship of the Internet. Rallies in New Delhi, Mumbai, Bangalore and Kolkata followed a court order in March demanding 15 domestic Internet providers block access to file-sharing websites such as Pirate Bay. The order has result ... read more


CYBER WARS
Nepal 'Himalayan Viagra' harvest droops to record low

Latest genomic studies shed new light on maize diversity and evolution

OU scientists and international team deciper the genetic code of the tomato

Blowing in the wind: How hidden flower features are crucial for bees

CYBER WARS
SFU helps quantum computers move closer

Rice, UCLA slash energy needs for next-generation memory

Unique approach to materials allows temperature-stable circuits

Integrated sensors handle extreme conditions

CYBER WARS
China says to build 70 new airports by 2015

Airline industry profits to plummet in 2012: IATA

Carbon tax and Europe to dominate airline talks

Israel: Second F-35 deal is in the cards

CYBER WARS
Sao Paulo struggles to upgrade creaking transport system

China auto sales rise 16% in May

Chinese and Japanese investors bid for Saab

Volkswagen targets China in group shakeup

CYBER WARS
China faces 'severe' trade situation: minister

China exports, imports rise sharply

Latin America starts new regional alliance

Outside View: Trade deficit drag

CYBER WARS
Bamboo points way to green construction in Indonesia's Bali

Trees grow in Poland through free send-a-seedling drive

Highway through Amazon worsens effects of climate change, provides mixed economic gains

Standing trees better than burning ones for carbon neutrality

CYBER WARS
Apple unveils maps program, challenging Google

Taking action for GMES

CryoSat goes to sea

S Korea to develop geostationary satellite for environmental monitoring

CYBER WARS
Researchers love triangles

Coatings with nanoparticles that interact with sunlight and eliminate contaminants are developed

Wyss Institute develops nanodevice manufacturing strategy using DNA 'building blocks'

First direct observation of oriented attachment in nanocrystal growth




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement