A complex targeted cyber-attack that collected private data from countries such as Israel and Iran has been uncovered, researchers have said.
Russian security firm Kaspersky Labs told the BBC they believed the malware, known as Flame, had been operating since August 2010.
The company said it believed the attack was state-sponsored, but could not be sure of its exact origins.
In the past, targeted malware - such as Stuxnet - has in the past targeted nuclear infrastructure in Iran.
This new threat appears not to cause physical
You don’t need to hear it from me that the Internet is a really interesting phenomenon, and mega-useful for all those who use it. But at the same time its openness and uncontrollability mean that a ton of unpleasantness can also await users – not only on dubious porno/warez sites, but also completely legitimate,
RunningShoes.com CEO Chad Weinman lost more than $10,000 when GoDaddy went offline Monday. Photo: RunningShoes.comThese days when there’s trouble on the internet, there’s usually someone at the ready to jump up and take (or assign) blame for whatever went wrong, nevermind the facts. It can mean free publicity for your cause — whether it’s killing laws like SOPA or beefing up the federal budget for cyber security.Sometimes it doesn’t much more than a tweet and a Pastebin post to get a serious amount of free publicity. So in the spirit of yesterday’s GoDaddy incident where a random Twitter handle claimed to have downed the hosting giant, here
Earlier today, we received an interesting collection of samples from colleagues at another anti-malware company.
Of course, the wiper reference immediately reminds us of the Iranian computer-wiping incidents from April 2012 that led to the discovery of Flame.
The resources 112, 113 and 116 are encrypted using a 4 byte XOR operation. They keys for decryption, including another resource from one of the binaries are:
The disk driver itself does not appear to be malicious. However, it is used for raw disk access by the malware components.
Posted on 15 August 2012. | A significant drop-off in externally reported security issues has been taken as a signal and the people behind the project decided to introduce some changes to the reward structure.
Posted on 15 August 2012. | Prolexic Technologies exposed weaknesses in the C&C architecture of the Dirt Jumper DDoS Toolkit family that could neutralize would-be attackers.
Posted on 14 August 2012. | Malware development has long stopped being the exclusive domain of individuals and groups looking for strictly fame or money.
Posted on 14 August 2012.
- The Language of UX: Beyond Buzzwords -
- Discover the opportunities and challenges associated with mobile retail - Mobile Commerce World - Mobile Commerce World
- Get practical strategies to build a solid plan for profitability and success - Mobile Commerce World - Mobile Commerce World
- Delve into technologies and business issues around mobile payments and wallets - Mobile Commerce World - Mobile Commerce World
- Explore best practices for marketers in the new mobile world - Mobile Commerce World - Mobile Commerce World
- Meeting the Unilever eScience Challenges: To out-compute is to out-compete
- How to Automate CE 2.0 Service Delivery
- BYOD and Windows 7 Migration are the Questions. Is Desktop as a Service the Answer?
- Intelligent Management of WAS Applications: Reduce Cost, Complexity, and Errors
- Data Center Performance: Optimization Secrets Revealed