Subscribe free to our newsletters via your
. Solar Energy News .




CYBER WARS
Flame spy virus gets order to vanish: experts
by Staff Writers
San Francisco (AFP) June 10, 2012


US computer security researchers said Sunday that the Flame computer virus that smoldered undetected for years in Middle Eastern energy facilities has gotten orders to vanish, leaving no trace.

Anti-virus company Symantec said in a blog post that late last week, some Flame "command-and-control servers sent an updated command to several compromised computers."

"This command was designed to completely remove (Flame) from the compromised computers."

Flame malicious software (malware) appears to have been "in the wild" for two years or longer and prime targets so far have been energy facilities in the Middle East, especially in Iran.

The discovery of Flame immediately sparked speculation that it had been created by US and Israeli security services to steal information about Iran's controversial nuclear drive.

Kaspersky Lab, one of the world's biggest producers of anti-virus software, said the Flame virus was "about 20 times larger than Stuxnet," the worm which was discovered in June 2010 and used against the Iranian nuclear program.

High concentrations of computers compromised by Flame were also found in Lebanon, the West Bank and Hungary. Additional infections have been reported in Austria, Russia, Hong Kong and the United Arab Emirates.

Compromised computers included many being used from home connections, according to security researchers who were looking into whether reports of infections in some places resulted from workers using laptops while traveling.

While the components and tactics of Flame were considered old-school, the gigantic virus's interchangeable software modules and targeted nature were evidence that malware is a potent weapon in the Internet era.

Computers infected with malware are typically programmed to reach out on the Internet to get updated orders from command servers controlled by hackers.

In this case, it appeared that Flame masters gave an order for the malware to vanish, leaving behind no trail that investigators might be able to follow or clues to its origin.

The self-destruct command was evidently sent after Flame was exposed and investigations commenced.

Infected computers that got the command went on to delete an array of files and then cram disks with random characters to thwart recovery of original code, according to security researchers.

It was unknown how many infected computers received the self-destruct command.

Flame was designed to suck information from computer networks and relay what it learned back to those controlling the virus. It can record keystrokes, capture screen images, and eavesdrop using microphones built into computers.

In an intriguing twist, the malware can also use Bluetooth capabilities in machines to connect with smartphones or tablets, mining contact lists or other information, according to security researchers.

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
'Anonymous' hackers protest over India Internet laws
New Delhi (AFP) June 9, 2012
Indian demonstrators supporting the global hacking movement Anonymous took to the streets on Saturday to protest against what they consider growing government censorship of the Internet. Rallies in New Delhi, Mumbai, Bangalore and Kolkata followed a court order in March demanding 15 domestic Internet providers block access to file-sharing websites such as Pirate Bay. The order has result ... read more


CYBER WARS
Environmental benefit of biofuels is overestimated, new study claims

Steel-Strength Plastics That Are Clean And Green

Bigger refuges needed to delay pest resistance to biotech corn

Gasification may convert mesquite and juniper wood to a usable bioenergy

CYBER WARS
Robotic jellyfish could one day patrol oceans, clean oil spills, and detect pollutants

Graphene-control cutting using an atomic force microscope-based nanorobot

Rescue robot tested at So. Calif. beach

DLR presents innovations in robotics at AUTOMATICA 2012

CYBER WARS
Change in air as Africa's biggest wind farm set for Kenya

Wind Powering An Island Economy

China Leads Growth in Global Wind Power Capacity

US slaps duties on Chinese wind towers

CYBER WARS
Sao Paulo struggles to upgrade creaking transport system

China auto sales rise 16% in May

Chinese and Japanese investors bid for Saab

Volkswagen targets China in group shakeup

CYBER WARS
Gazprom may pay Bulgaria's pipeline share

China to lower fuel prices

Bombs hit Iraq pipelines, exports unhurt: officials

Tennessee takes big step towards nuclear fusion power

CYBER WARS
Japan's PM wants nuclear reactor restarts

Japan PM renews plea for nuclear restart

Russia supports 'peaceful' nuclear drive in Iran

Germany will coordinate with neighbours on nuclear exit

CYBER WARS
TEPCO to buy 1 million tons LNG a year from Qatar

Nuclear and coal-fired electrical plants vulnerable to climate change

American Electric Power Pulls Billion Dollar Big Sandy Request

US and European energy supplies vulnerable to climate change

CYBER WARS
Bamboo points way to green construction in Indonesia's Bali

Trees grow in Poland through free send-a-seedling drive

Highway through Amazon worsens effects of climate change, provides mixed economic gains

Standing trees better than burning ones for carbon neutrality




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement