A computer engineer checks equipment at an internet service provider in Tehran February 15, 2011. REUTERS/Caren Firouz

BOSTON | Mon May 28, 2012 6:17pm EDT

(Reuters) - Security experts said

(Reuters) - Security experts said on Monday a highly sophisticated computer virus is infecting computers in Iran and other Middle East countries and may have been deployed at least five years ago to engage in state-sponsored cyber espionage.

Evidence suggest that the virus, dubbed Flame, may have been built on behalf of the same nation or nations that commissioned the Stuxnet worm that attacked Iran's nuclear program in 2010, according to Kaspersky Lab, the Russian cyber security software maker that took credit for discovering the infections.

Kaspersky researchers said they have yet to determine whether Flame had a specific mission like Stuxnet, and declined to say who they think built it.

Iran has accused the United States and Israel of deploying Stuxnet.

Cyber security experts said the discovery publicly demonstrates what experts privy to classified information have long known: that nations have been using pieces of malicious computer code as weapons to promote their security interests for several years.

"This is one of many, many campaigns that happen all the time and never make it into the public domain," said Alexander Klimburg, a cyber security expert at the Austrian Institute for International Affairs.

A cyber security agency in Iran said on its English website that Flame bore a "close relation" to Stuxnet, the notorious computer worm that attacked that country's nuclear program in 2010 and is the first publicly known example of a cyber weapon.

Iran's National Computer Emergency Response Team also said Flame might be linked to recent cyber attacks that officials in Tehran have said were responsible for massive data losses on some Iranian computer systems.

Kaspersky Lab said it discovered Flame after a U.N. telecommunications agency asked it to analyze data on malicious software across the Middle East in search of the data-wiping virus reported by Iran.

STUXNET CONNECTION

Experts at Kaspersky Lab and Hungary's Laboratory of Cryptography and System Security who have spent weeks studying Flame said they have yet to find any evidence that it can attack infrastructure, delete data or inflict other physical damage.

Yet they said they are in the early stages of their investigations and that they may discover other purposes beyond data theft. It took researchers months to determine the key mysteries behind Stuxnet, including the purpose of modules used to attack a uranium enrichment facility at Natanz, Iran.

If Kaspersky's findings are validated, Flame could go down in history as the third major cyber weapon uncovered after Stuxnet and its data-stealing cousin Duqu, named after the Star Wars villain.

The Moscow-based company is controlled by Russian malware researcher Eugene Kaspersky. It gained notoriety after solving several mysteries surrounding Stuxnet and Duqu.

Officials with Symantec Corp and Intel Corp McAfee security division, the top 2 makers of anti-virus software, said they were studying Flame.

"It seems to be more complex than Duqu but it's too early to tell its place in history," said Dave Marcus, director of advanced research and threat intelligence with McAfee.

Symantec Security Response manager Vikram Thakur said that his company's experts believed there was a "high" probability that Flame was among the most complex pieces of malicious software ever discovered.

At least one rival of Kaspersky expressed skepticism.

Privately held Webroot said its automatic virus-scanning engines detected Flame in December 2007, but that it did not pay much attention because the code was not particularly menacing.

That is partly because it was easy to discover and remove, said Webroot Vice President Joe Jaroch. "There are many more dangerous threats out there today," he said.

read on

http://www.reuters.com/article/2012/05/28/net-us-cyberwar-flame-idU...

Views: 57

Reply to This

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

honeygirl posted videos
15 hours ago
Doc Vega posted a blog post

You’ve Heard of Champ, right? This Aint it!

 CHAMP, you might be thinking of is a legendary cryptid supposedly existing in the waters of Lake…See More
yesterday
Less Prone favorited Sandy's photo
yesterday
Less Prone favorited Sandy's photo
yesterday
Doc Vega posted a blog post

Truth or Fiction? You Figure it Out

 Working for the federal government, specifically, the Pentagon. I was, what you might call a…See More
Saturday
tjdavis posted a video

GOLDSPHINCTER - Donald J Trump is Acrid Goldsphincter (James Bond Music Parody)

In this James Bond parody, Donald J Trump is Acrid Goldsphincter in our version of the classic Bond "Goldfinger" theme song. All voices and singing performed...
Saturday
Doc Vega posted a blog post

How Long does Destabilization Take?

How long does it take to topple a society targeted by the left? What ingredients go into this toxic…See More
Thursday
tjdavis posted a photo
Thursday
tjdavis posted a video
Apr 8
Doc Vega posted blog posts
Apr 7
Burbia commented on Cryptocurrency's group Video Archive
Apr 7
Doc Vega commented on Doc Vega's blog post How Many Clues Did You Need To Figure out the Covid scare was Bogus? Revisiting Stupidity
"cheeki kea you are spot on. It won't be until the elephant on Wall Street is as high as the…"
Apr 6
Sandy posted photos
Apr 6
harrisseo is now a member of 12160 Social Network
Apr 5
Doc Vega's 4 blog posts were featured
Apr 5
tjdavis posted a blog post
Apr 4
tjdavis posted videos
Apr 4
cheeki kea left a comment for Gordon Freeman
"Greetings and welcome to you Gordon it's great to have you join us all here."
Apr 3
cheeki kea commented on cheeki kea's photo
Apr 3
cheeki kea posted a photo
Apr 3

© 2026   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted