It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
(visit the link for the full news article)
The creators of the Flame cyber-espionage threat ordered infected computers still under their control to download and execute a component designed to remove all traces of the malware and prevent forensic analysis, security researchers from Symantec said on Wednesday.
Flame has a built-in feature called SUICIDE that can be used to uninstall the malware from infected computers. However, late last week, Flame's creators decided to distribute a different self-removal module to infected computers...
The module is called browse32.ocx and its most recent version was created on May 9, 2012. "It is unknown why the malware authors decided not to use the SUICIDE functionality, and instead make Flamer perform explicit actions based on a new module," the Symantec researchers said.
However, even though it is similar in functionality to the SUICIDE feature -- both being able to delete a large number of files associated with the malware -- the new module goes a step further.
"It locates every [Flame] file on disk, removes it, and subsequently overwrites the disk with random characters to prevent anyone from obtaining information about the infection," the Symantec researchers said. "This component contains a routine to generate random characters to use in the overwriting operation. It tries to leave no traces of the infection behind."
According to Aleks Gostev, chief security expert with Kaspersky Lab's global research & analysis team, the overwriting of file data with meaningless characters happens before the Flame files get deleted by browse32.ocx, not after as Symantec suggested. However, the goal is the same -- eliminating all traces of the malware and making forensic analysis harder, he said via email.
The Flame espionage malware that infected computers in Iran achieved mathematic breakthroughs that could only have been accomplished by world-class cryptographers, two of the world's foremost cryptography experts said.
"We have confirmed that Flame uses a yet unknown MD5 chosen-prefix collision attack," Marc Stevens and B.M.M. de Weger wrote in an e-mail posted to a cryptography discussion group earlier this week. "The collision attack itself is very interesting from a scientific viewpoint, and there are already some practical implications."
According to Stevens and de Weger, the collision attack was unlike any that cryptographers have seen before. They arrived at that conclusion after using a custom-designed forensic tool to analyze Flame components.
"More interestingly, the results have shown that not our published chosen-prefix collision attack was used, but an entirely new and unknown variant," Stevens wrote in a statement distributed on Thursday. "This has led to our conclusion that the design of Flame is partly based on world-class cryptanalysis. Further research will be conducted to reconstruct the entire chosen-prefix collision attack devised for Flame."
The analysis reinforces theories that researchers from Kaspersky Lab, CrySyS Lab, and Symantec published almost two weeks ago. Namely, Flame could only have been developed with the backing of a wealthy nation-state.
I wonder why?
Originally posted by chasingbrahman
I think this has to do with the White House leak confirming US involvement in Stuxnet development.
They can't afford another snafu. Since keyboards have been busy determining whether Flame generated from the US/Israel as well, I suppose they took that to mean the heat was on, best to put out the Flame. Better to look guilty, than be proven guilty.
Just like how Holder's email mentioning "Fast and Furious" was about the second round of the Candyland World Championships.
Makes me want to pour rat poison on my head and eat my own face off.
The Obama administration is facing cross-party calls for an independent investigation into a spate of recent intelligence leaks about its secret war against al-Qaeda and efforts to disable Iran's nuclear programme using computer viruses.
Senior Republicans have accused the Obama White House of deliberately leaking material in order to burnish his credentials as commander-in-chief.
Senator John McCain, the 2008 Republican presidential candidate, said the leaks were deliberately designed to make the president "look decisive" and came from the "highest levels" of the White House, an accusation that the White House spokesman, Jay Carney, said was "grossly irresponsible".
RT: So, how did you spot the malware, was it a planned investigation, or did it come by surprise?
Vitaly Kamlyuk: It was by surprise. We were initially searching for a [different form of] malware. We were aware of the malware that had spread throughout the Middle East, attacked hundreds of computers and wiped their hard drives, making the systems unbootable after that. It was actually after an inquiry from the International Telecommunications Union, which is a part of the United Nations, who actually asked us to start conducting research. When we started looking for this mysterious malware in the Middle East, we discovered this suspicious application that turned out to be even more interesting than the initial target of our search.
It’s also quite unique in the way it steals information. It’s possible to steal different types of information with the help of this spyware tool. It can record audio if a microphone is attached to the infected system, it can do screen captures and transmit visual data. It can steal information from the input boxes when they are hidden behind asterisks, password fields; it can get information from there. Also it can scan for locally visible Bluetooth devices if there is a Bluetooth adapter attached to the local system.
I think this has to do with the White House leak confirming US involvement in Stuxnet development.
Originally posted by JBA2848
The problem with the antivirus software is they search through software files and look for files that operate in a certain way that is virus like. The Stuxnet Flame Duqu are not complete files. They are pieces scattered through out the system. None of the pieces are whole. Take the Zip programs that were created to zip files into compressed files. The antivirus programs used to have a hard time searching a zipped file for viruses. But they came out with a program to search within a zipped file. So they began simply zipping files twice. But then they found a way to also look into a zip file that has been zipped up to three times Zip programs then started with a feature to break zip files into multiple pieces and avoided the antivirus scanning. And the antivirus companies still have not been able to create a smart scanner that can unsplit a zipped file and put it back together to look inside. So then when you look at it in this light you start to see why TinyOS is the perfect program for STUXnet Flame Duqu. And TinyOS was created to travel any platform any connection and operates the same way these zip programs have been doing it breaks apart into tiny pieces but still operates as if it is a whole program still. Its a split into multiple pieces and zipped but acts as if it is whole. The anitvirus software has no feature to do anything about it or even find it. The only thing they can do is search for it communicating. But TinyOS is made to operate in the cellphone industry. It operates in burst and waits for normal communication and hides in it to reduce the power it uses. So finding its communication means having to do a complete break down of every communication stream sent out. Very hard and time consuming project to under take.
nescc.sourceforge.net...edit on 8-6-2012 by JBA2848 because: (no reason given)