It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

Back to Stuxnet: the missing link

page: 1
5

log in

join
share:

posted on Jun, 11 2012 @ 02:03 PM
link   

Back to Stuxnet: the missing link


www.securelist.com


This particular code, which exactly matches the code in resource 207, is currently used by Flame, where it is executed by the “Autorun_infector” module.

The exploit code in the file atmpsvcn.ocx is similar to that which we, Kaspersky Lab, found in the 2010 versions of Stuxnet and which was subsequently addressed by the MS10-073 patch. The code’s style, logic and details of its implementation were the same in the 2009 and 2010 code. Clearly, these two pieces of
(visit the link for the full news article)


Related News Links:
www.abovetopsecret.com
news.cnet.com
news.cnet.com



posted on Jun, 11 2012 @ 02:03 PM
link   
All i need to say is that this obviously isn't a basement beer drinking nerdy piece of code. Obviously and how ever limited one's computer comprehension is, it screams government all over.

The interesting part of all this cyber terror and conspiracy is a thread that openly points to who is responsible but for some reason no-one is actually naming them. Could this actually be what all these new cyber terror bills being pushed throughout the world regarding the internet censorship are whats driving and keeping them from being unmasked.

My question is, since the u.s. and israel have been fingered as the main contributors to this recent cyber war/virus, then why isn't anyone actually going head to head with them. As we have seen the recent malware that exploded via twitter links is more or less putting the final piece of the puzzle into play, add to this development the recent introduction of facebook into the big leagues has more or less sealed the deal for current and future cyber wars. Sadly as in real life, there will be casualties and during the recent war's they were referred to as " friendly fire ".

www.securelist.com
(visit the link for the full news article)
edit on 11-6-2012 by cerebralassassins because: (no reason given)



posted on Jun, 11 2012 @ 02:06 PM
link   
The deeper you dig, the less light is able to come through.


The espionage malware has already been updated on some infected machines -- after command-and-control domains were shut down last week, researchers say.

The mysterious Flame malware used domain names registered with fake names to communicate with infected computers in the Middle East for at least four years, researchers said today.

Someone began creating the 86 domains and more than 24 IP addresses that host the command-and-control (C&C) servers as early as 2008, using fake identities and addresses in Austria and Germany to register them with GoDaddy and others, Roel Schouwenberg, senior researcher at Kaspersky Lab, said in a Web conference with reporters this morning. He speculated that stolen credit cards were used for the transactions.

news.cnet.com...


In a recent thread within ATS it was already said that

Google said it planned to issue the warning anytime it picks up malicious–possibly state-sponsored–activity on a user’s account or computer. How does Google know whether an attack is state-sponsored? It won’t say.
www.abovetopsecret.com...


edit on 11-6-2012 by cerebralassassins because: (no reason given)



posted on Jun, 12 2012 @ 10:23 AM
link   
reply to post by cerebralassassins
 


The more I read about this, the more I get the feeling the US/Israel contracted Kapersky lab to design the bugger. It makes no sense that Kapersky's reason for even knowing about Flame was due to a call from the UN asking them to take a look at it.



posted on Jun, 13 2012 @ 12:18 AM
link   
reply to post by chasingbrahman
 


You obviously don't understand infosec. It makes complete sense.




top topics
 
5

log in

join