Page 1 of 3 123 LastLast
Results 1 to 20 of 69

Thread: Worst Cyber Attack In History: Malware "Flame" Discovered Targeting Middle Eastern Countries, Especially Iran

Hybrid View

Previous Post Previous Post   Next Post Next Post
  1. #1
    Indefinitely Banned
    Join Date
    Nov 2007
    Posts
    21,467

    Default Worst Cyber Attack In History: Malware "Flame" Discovered Targeting Middle Eastern Countries, Especially Iran

    Kaspersky labs, a russian anti virus software company has discovered the malware 'Flame', and noted it's been targeting middle eastern countries:
    http://en.wikipedia.org/wiki/Flame_(malware)

    but apparently, it's worse than stuxnet (remember that?)


    Flame" computer virus strikes Middle East; Israel speculation continues

    (AP) LONDON - A massive, data-slurping cyberweapon is circulating in the Middle East, and computers in Iran appear to have been particularly affected, according to a Russian Internet security firm.

    Moscow-based Kaspersky Lab ZAO said the "Flame" virus was unprecedented both in terms of its size and complexity, possessing the ability to turn infected computers into all-purpose spying machines that can even suck information out of nearby cell phones.

    "This is on a completely different level," Kaspersky researcher Roel Schouwenberg said in a telephone interview Tuesday. "It can be used to spy on everything that a user is doing."

    The announcement sent a ripple of excitement across the computer security sector. Flame is the third major cyberweapon discovered in the past two years, and Kaspersky's conclusion that it was crafted at the behest of a national government fueled speculation that the virus could be part of an Israeli-backed campaign of electronic sabotage aimed at archrival Iran.

    Although their coding is different, Schouwenberg said there was some evidence to suggest that the people behind Flame also helped craft Stuxnet, a notorious virus that disrupted controls of some nuclear centrifuges in Iran in 2010.

    "Whoever was behind Flame had access to the same exploits and same vulnerabilities as the Stuxnet guys," he said, speculating that two teams may have been working in parallel to write both programs.

    Stuxnet revolutionized the cybersecurity field because it targeted physical infrastructure rather than data, one of the first demonstrations of how savvy hackers can take control of industrial systems to wreak real-world havoc.

    So far, Flame appears focused on espionage. The virus can activate a computer's audio systems to eavesdrop on Skype calls or office chatter, for example. It can also take screenshots, log keystrokes, and - in one of its more novel functions - steal data from Bluetooth-enabled cell phones.

    Tehran has not said whether it lost any data to the virus, but a unit of the Iranian communications and information technology ministry said it had produced an anti-virus capable of identifying and removing Flame from its computers.

    Speaking Tuesday, Israel's vice premier did little to deflect suspicion about the Jewish state's possible involvement in the latest attack.

    "Whoever sees the Iranian threat as a significant threat is likely to take various steps, including these, to hobble it," Israeli Vice Premier Moshe Yaalon told Army Radio when asked about Flame. "Israel is blessed with high technology, and we boast tools that open all sorts of opportunities for us."

    Flame is unusually large.

    Malicious programs collected by U.K. security firm Sophos averaged about 340 kilobytes in 2010, the same year that Kaspersky believes Flame first started spreading. Flame weighs in at 20 megabytes - nearly 60 times that figure.

    Alan Woodward, a professor of computing at the University of Surrey in southern England, said the virus was modular - meaning that functions could be added or subtracted to it as needed. He compared it to a smartphone, saying that, depending on what kind of espionage you want to carry out, "you just add apps."

    He was particularly struck by Flame's ability to attack Bluetooth-enabled devices left near an infected computer.

    Bluetooth is a short-range wireless communications protocol generally used for wireless headsets, in-car audio systems or file-swapping between mobile phones. Woodward said that Flame can turn an infected computer into a kind of "industrial vacuum cleaner," copying data from vulnerable cell phones or other devices left near it.

    "I don't believe I've seen it before," he said.

    Udi Mokady, chief executive of Cyber-Ark, an Israeli developer of information security, said he thought four countries, in no particular order, had the technological know-how to develop so sophisticated an electronic offensive: Israel, the U.S., China and Russia.

    "It was 20 times more sophisticated than Stuxnet," with thousands of lines of code that took a large team, ample funding and months, if not years, to develop, he said. "It's a live program that communicates back to its master. It asks, `Where should I go? What should I do now?' It's really almost like a science fiction movie," he said.

    It's not clear what exactly the virus was targeting. Kaspersky said it had detected the program in hundreds of computers, mainly in Iran but also in Israel, the Palestinian territories, Sudan, Syria, Lebanon, Saudi Arabia and Egypt.

    The company has declined to go into detail about the nature of the victims, saying only that they "range from individuals to certain state-related organizations or educational institutions."

    Schouwenberg, the Kaspersky researcher, said stolen data was being sent to some 80 different servers, something which would give the virus's controllers time to readjust their tactics if they were discovered. He added that some of Flame's functions still weren't clear.

    "Maybe it's just espionage," he said. "Maybe it's also sabotage."

    Kaspersky said it first detected the virus after the United Nations' International Telecommunication Union asked it for help in finding a piece of malware that was deleting sensitive information across the Middle East. The company stumbled across Flame when searching for that other code, it said.

    Spokespeople for the Geneva-based Telecommunication Union didn't return emails seeking comment.

    The discovery of the Flame virus comes just days after nuclear talks between Iran and six world powers in Baghdad failed to persuade Tehran to freeze uranium enrichment. A new round of talks is expected to take place in Moscow next month.

    Yaalon, the Israeli vice premier, told Army Radio on Tuesday that the talks in Iraq "yielded no significant achievement" except to let Iran buy time. He appeared to take a swipe at President Barack Obama by saying it might "even be in the interest of some players in the West to play for time."
    Source:http://www.cbsnews.com/8301-501465_1...ion-continues/

    seems the virus was obviously targeting iran's computer networks...
    and the iranians have started accusing the US of being behind the cyber attack (guess investing in the cyber division was worth it eh)

    some general info on Flame:
    The Flame Virus: Your FAQs Answered
    By Jared Newman, PCWorld May 30, 2012 8:54 AM

    A frightening computer virus called Flame is on the loose in Iran and other parts of the Middle East, infecting PCs and stealing sensitive data. Now, the United Nations' International Telecommunications Union warns that other nations face the risk of attack.

    But what is Flame, exactly, and is it cause for concern among ordinary PC users? Here's what you need to know about what Kaspersky calls “one of the most complex threats ever discovered.”

    Flame Virus: The Basics
    Kaspersky describes Flame as a backdoor and a Trojan with worm-like features. The initial point of entry for the virus is unknown -- spearphishing or infected websites are possibilities -- but after the initial infection, the virus can spread through USB sticks or local networks.

    Flame is meant to gather information from infected PCs. As Kaspersky's Vitaly Kamlyuk told RT, the virus can sniff out information from input boxes, including passwords hidden by asterisks, record audio from a connected microphone and take screenshots of applications that the virus deems important, such as IM programs. It can also collect information about nearby discoverable Bluetooth devices. The virus then uploads all this information to command and control servers, of which there are about a dozen scattered around the world.

    The virus is reminiscent of the Stuxnet worm that wreaked havoc on Iran in 2010, but Kaspersky says Flame is much complex, with its modules occupying more than 20 MB of code. “Consider this: it took us several months to analyze the 500K code of Stuxnet. It will probably take year to fully understand the 20MB of code of Flame,” the firm said.

    What Are Flame's Origins?
    Flame has been in the wild since 2010, according to Kaspersky, but its creation date is unclear. The virus was discovered a month ago after Iran's oil ministry learned that several companies' servers had been attacked. That finding led to more evidence of attacks on other government ministries and industries in Iran.

    Iran has claimed that the attacks also wiped the hard drives of some machines, but Kaspersky claims that the malware responsible, called Wiper, isn't necessarily related. Wiper attacks were isolated to Iran, while Flame has been found in other countries.

    Flame's creator is also unknown, but a nation-state was likely behind it. The virus is not designed to steal money from bank accounts, and is much more complex than anything commonly used by “hacktivists,” so a nation-created virus is the only other possibility that makes sense.

    Who is at Risk?
    The United Nations' International Telecommunications Union is now warning other nations to “be on alert” for the virus, which could potentially be used to attack critical infrastructure. In a statement to Reuters, the U.S. Department of Homeland Security said it was “notified of the malware and has been working with our federal partners to determine and analyze its potential impact on the U.S.”

    Security firms have not been warning of any direct risk to average Internet users. Sophos' Graham Cluley noted that Flame has only been discovered in a few hundred computers. “Certainly, it's pretty insignificant when you compare it to the 600,000 Mac computers which were infected by the Flashback malware earlier this year,” Cluley wrote in a blog post.
    Source: http://www.pcworld.com/article/25650..._answered.html
    Last edited by Exarch; May 30, 2012 at 12:07 PM.

  2. #2
    ash874's Avatar Campidoctor
    Join Date
    Dec 2009
    Location
    israel
    Posts
    1,693

    Default Re: Worst Cyber Attack In History: Malware "Flame" Discovered Targeting Middle Eastern Countries, Especially Iran

    it has the kremlin's fingerprints all over it

  3. #3

    Default Re: Worst Cyber Attack In History: Malware "Flame" Discovered Targeting Middle Eastern Countries, Especially Iran

    Quote Originally Posted by ash874 View Post
    it has the kremlin's fingerprints all over it

    or China's, or Israels, or the US or any of the bigger EU nations. Unlikely anyone will own up or be caught.

  4. #4

    Default Re: Worst Cyber Attack In History: Malware "Flame" Discovered Targeting Middle Eastern Countries, Especially Iran

    Worst in history? I'm not so sure.

    I would say ms blaster and melissa. I forget but one of the two actually hijacked windows update and installed malware on peoples automatically updating computers. Millions were affected all over the world.
    Last edited by Kanaric; May 30, 2012 at 05:21 AM.
    Swear filters are for sites run by immature children.

  5. #5
    priam11's Avatar Campidoctor
    Join Date
    Dec 2008
    Location
    Toronto-Home of the crack smokin Robbie Ford
    Posts
    1,756

    Default Re: Worst Cyber Attack In History: Malware "Flame" Discovered Targeting Middle Eastern Countries, Especially Iran

    You are being watched. The government has a secret system: a machine that spies on you every hour of every day. I know because I built it. I designed the machine to detect acts of terror, but it sees everything. Violent crimes involving ordinary people, people like you. Crimes the government considered irrelevant. They wouldn't act, so I decided I would. But I needed a partner, someone with the skills to intervene. Hunted by the authorities, we work in secret. You'll never find us, but victim or perpetrator, if your number's up...we'll find you.
    "Tell people that there's an invisible man in the sky who created the universe, and the vast majority will believe you.
    Tell them the paint is wet, and they have to touch it to be sure."
    -George Carlin

  6. #6
    Imperial's Avatar Primicerius
    Join Date
    Oct 2010
    Location
    Florida, US (wang of America)
    Posts
    3,838

    Default Re: Worst Cyber Attack In History: Malware "Flame" Discovered Targeting Middle Eastern Countries, Especially Iran

    Not really a virus, more like a RAT (remote admin tool).
    Last edited by Imperial; May 30, 2012 at 07:14 AM.

  7. #7
    Protector Domesticus
    Citizen

    Join Date
    Aug 2003
    Posts
    4,045

    Default Iran hit by the most complex and dangerous computer virus ever seen

    Hard to imagine that something that's supposedly "20 times worse" than Stuxnet would come along so quickly. And the REALLY scary stuff about this that's just now coming to light?:

    The code is 5 years old and has 20 other plug ins that so far no expert has been able to figure out what it's doing.

    Stuxnet made their centrifuges physically explode and was much smaller and simplistic by comparison, whereas it's not even known what else Flame is doing to the computers it's infected.

    Source
    Map showing the number and geographical location of Flame infections detected by Kaspersky Lab on customer machines. Courtesy of Kaspersky


    A massive, highly sophisticated piece of malware has been newly found infecting systems in Iran and elsewhere and is believed to be part of a well-coordinated, ongoing, state-run cyberespionage operation.

    The malware, discovered by Russia-based antivirus firm Kaspersky Lab, is an espionage toolkit that has been infecting targeted systems in Iran, Lebanon, Syria, Sudan, the Israeli Occupied Territories and other countries in the Middle East and North Africa for at least two years.

    Dubbed “Flame” by Kaspersky, the malicious code dwarfs Stuxnet in size — the groundbreaking infrastructure-sabotaging malware that is believed to have wreaked havoc on Iran’s nuclear program in 2009 and 2010. Although Flame has both a different purpose and composition than Stuxnet, and appears to have been written by different programmers, its complexity, the geographic scope of its infections and its behavior indicate strongly that a nation-state is behind Flame, rather than common cyber-criminals — marking it as yet another tool in the growing arsenal of cyberweaponry.

    The researchers say that Flame may be part of a parallel project created by contractors who were hired by the same nation-state team that was behind Stuxnet and its sister malware, DuQu.

    “Stuxnet and Duqu belonged to a single chain of attacks, which raised cyberwar-related concerns worldwide,” said Eugene Kaspersky, CEO and co-founder of Kaspersky Lab, in a statement. “The Flame malware looks to be another phase in this war, and it’s important to understand that such cyber weapons can easily be used against any country.”

    Early analysis of Flame by the Lab indicates that it’s designed primarily to spy on the users of infected computers and steal data from them, including documents, recorded conversations and keystrokes. It also opens a backdoor to infected systems to allow the attackers to tweak the toolkit and add new functionality.

    The malware, which is 20 megabytes when all of its modules are installed, contains multiple libraries, SQLite3 databases, various levels of encryption — some strong, some weak — and 20 plug-ins that can be swapped in and out to provide various functionality for the attackers. It even contains some code that is written in the LUA programming language — an uncommon choice for malware.

    Kaspersky Lab is calling it “one of the most complex threats ever discovered.”

    “It’s pretty fantastic and incredible in complexity,” said Alexander Gostev, chief security expert at Kaspersky Lab.

    Flame appears to have been operating in the wild as early as March 2010, though it remained undetected by antivirus companies.

    “It’s a very big chunk of code. Because of that, it’s quite interesting that it stayed undetected for at least two years,” Gostev said. He noted that there are clues that the malware may actually date back to as early as 2007, around the same time period when Stuxnet and DuQu are believed to have been created.

    Gostev says that because of its size and complexity, complete analysis of the code may take years.

    “It took us half a year to analyze Stuxnet,” he said. “This is 20 times more complicated. It will take us 10 years to fully understand everything.”

    Kaspersky discovered the malware about two weeks ago after the United Nations’ International Telecommunications Union asked the Lab to look into reports in April that computers belonging to the Iranian Oil Ministry and the Iranian National Oil Company had been hit with malware that was stealing and deleting information from the systems. The malware was named alternatively in news articles as “Wiper” and “Viper,” a discrepancy that may be due to a translation mixup.

    Kaspersky researchers searched through their reporting archive, which contains suspicious filenames sent automatically from customer machines so the names can be checked against whitelists of known malware, and found an MD5 hash and filename that appeared to have been deployed only on machines in Iran and other Middle East countries. As the researchers dug further, they found other components infecting machines in the region, which they pieced together as parts of Flame.

    Kaspersky, however, is currently treating Flame as if it is not connected to Wiper/Viper, and believes it is a separate infection entirely. The researchers dubbed the toolkit “Flame” after the name of a module inside it.

    Flame is named after one of the main modules inside the toolkit. Courtesy of Kaspersky


    Among Flame’s many modules is one that turns on the internal microphone of an infected machine to secretly record conversations that occur either over Skype or in the computer’s near vicinity; a module that turns Bluetooth-enabled computers into a Bluetooth beacon, which scans for other Bluetooth-enabled devices in the vicinity to siphon names and phone numbers from their contacts folder; and a module that grabs and stores frequent screenshots of activity on the machine, such as instant-messaging and e-mail communications, and sends them via a covert SSL channel to the attackers’ command-and-control servers.

    The malware also has a sniffer component that can scan all of the traffic on an infected machine’s local network and collect usernames and password hashes that are transmitted across the network. The attackers appear to use this component to hijack administrative accounts and gain high-level privileges to other machines and parts of the network.

    Flame does contain a module named Viper, adding more confusion to the Wiper/Viper issue, but this component is used to transfer stolen data from infected machines to command-and-control servers. News reports out of Iran indicated the Wiper/Viper program that infected the oil ministry was designed to delete large swaths of data from infected systems.

    Kaspersky’s researchers examined a system that was destroyed by Wiper/Viper and found no traces of that malware on it, preventing them from comparing it to the Flame files. The disk destroyed by Wiper/Viper was filled primarily with random trash, and almost nothing could be recovered from it, Gostev said. “We did not see any sign of Flame on that disk.”

    Because Flame is so big, it gets loaded to a system in pieces. The machine first gets hit with a 6-megabyte component, which contains about half a dozen other compressed modules inside. The main component extracts, decompresses and decrypts these modules and writes them to various locations on disk. The number of modules in an infection depends on what the attackers want to do on a particular machine.

    Once the modules are unpacked and loaded, the malware connects to one of about 80 command-and-control domains to deliver information about the infected machine to the attackers and await further instruction from them. The malware contains a hardcoded list of about five domains, but also has an updatable list, to which the attackers can add new domains if these others have been taken down or abandoned.

    While the malware awaits further instruction, the various modules in it might take screenshots and sniff the network. The screenshot module grabs desktop images every 15 seconds when a high-value communication application is being used, such as instant messaging or Outlook, and once every 60 seconds when other applications are being used.

    Although the Flame toolkit does not appear to have been written by the same programmers who wrote Stuxnet and DuQu, it does share a few interesting things with Stuxnet.

    Stuxnet is believed to have been written through a partnership between Israel and the United States, and was first launched in June 2009. It is widely believed to have been designed to sabotage centrifuges used in Iran’s uranium enrichment program. DuQu was an espionage tool discovered on machines in Iran, Sudan, and elsewhere in 2011 that was designed to steal documents and other data from machines. Stuxnet and DuQu appeared to have been built on the same framework, using identical parts and using similar techniques.

    But Flame doesn’t resemble either of these in framework, design or functionality.

    Researchers aren't certain how Flame infects its initial target before spreading to other machines, but this graph suggests possible infection vectors. Courtesy of Kaspersky


    Stuxnet and DuQu were made of compact and efficient code that was pared down to its essentials. Flame is 20 megabytes in size, compared to Stuxnet’s 500 kilobytes, and contains a lot of components that are not used by the code by default, but appear to be there to provide the attackers with options to turn on post-installation.

    “It was obvious DuQu was from the same source as Stuxnet. But no matter how much we looked for similarities [in Flame], there are zero similarities,” Gostev said. “Everything is completely different, with the exception of two specific things.”

    One of these is an interesting export function in both Stuxnet and Flame, which may turn out to link the two pieces of malware upon further analysis, Gostev said. The export function allows the malware to be executed on the system.

    Also, like Stuxnet, Flame has the ability to spread by infecting USB sticks using the autorun and .lnk vulnerabilities that Stuxnet used. It also uses the same print spooler vulnerability that Stuxnet used to spread to computers on a local network. This suggests that the authors of Flame may have had access to the same menu of exploits that the creators of Stuxnet used.

    Unlike Stuxnet, however, Flame does not replicate automatically. The spreading mechanisms are turned off by default and must be switched on by the attackers before the malware will spread. Once it infects a USB stick inserted into an infected machine, the USB exploit is disabled immediately.

    This is likely intended to control the spread of the malware and lessen the likelihood that it will be detected. This may be the attackers’ response to the out-of-control spreading that occurred with Stuxnet and accelerated the discovery of that malware.

    It’s possible the exploits were enabled in early versions of the malware to allow the malware to spread automatically, but were then disabled after Stuxnet went public in July 2010 and after the .lnk and print spooler vulnerabilities were patched. Flame was launched prior to Stuxnet’s discovery, and Microsoft patched the .lnk and print spooler vulnerabilities in August and September 2010. Any malware attempting to use the vulnerabilities now would be detected if the infected machines were running updated versions of antivirus programs. Flame, in fact, checks for the presence of updated versions of these programs on a machine and, based on what it finds, determines if the environment is conducive for using the exploits to spread.

    The researchers say they don’t know yet how an initial infection of Flame occurs on a machine before it starts spreading. The malware has the ability to infect a fully patched Windows 7 computer, which suggests that there may be a zero-day exploit in the code that the researchers have not yet found.

    The earliest sign of Flame that Kaspersky found on customer systems is a filename belonging to Flame that popped up on a customer’s machine in Lebanon on Aug. 23, 2010. An internet search on the file’s name showed that security firm Webroot had reported the same filename appearing on a computer in Iran on Mar. 1, 2010. But online searches for the names of other unique files found in Flame show that it may have been in the wild even earlier than this. At least one component of Flame appears to have popped up on machines in Europe on Dec. 5, 2007 and in Dubai on Apr. 28, 2008.

    Kaspersky estimates that Flame has infected about 1,000 machines. The researchers arrived at this figure by calculating the number of its own customers who have been infected and extrapolating that to estimate the number of infected machines belonging to customers of other antivirus firms.

    All of the infections of Kaspersky customers appear to have been targeted and show no indication that a specific industry, such as the energy industry, or specific systems, such as industrial control systems, were singled out. Instead, the researchers believe Flame was designed to be an all-purpose tool that so far has infected a wide variety of victims. Among those hit have been individuals, private companies, educational institutions and government-run organizations.

    Symantec, which has also begun analyzing Flame (which it calls “Flamer”), says the majority of its customers who have been hit by the malware reside in the Palestinian West Bank, Hungary, Iran and Lebanon. They have received additional reports from customer machines in Austria, Russia, Hong Kong, and the United Arab Emirates.

    Researchers say the compilation date of modules in Flame appear to have been manipulated by the attackers, perhaps in an attempt to thwart researchers from determining when they were created.

    “Whoever created it was careful to mess up the compilation dates in every single module,” Gostev said. “The modules appear to have been compiled in 1994 and 1995, but they’re using code that was only released in 2010.”

    The malware has no kill date, though the operators have the ability to send a kill module to it if needed. The kill module, named browse32, searches for every trace of the malware on the system, including stored files full of screenshots and data stolen by the malware, and eliminates them, picking up any breadcrumbs that might be left behind.

    “When the kill module is activated, there’s nothing left whatsoever,” Gostev said.

  8. #8

    Default Re: Worst Cyber Attack In History: Malware "Flame" Discovered Targeting Middle Eastern Countries, Especially Iran

    Maybe governments getting a grip on the Arab Spring.
    Eats, shoots, and leaves.

  9. #9
    mrmouth's Avatar flaxen haired argonaut
    Join Date
    Apr 2007
    Location
    Chicago
    Posts
    10,741

    Default Re: Worst Cyber Attack In History: Malware "Flame" Discovered Targeting Middle Eastern Countries, Especially Iran

    Quote Originally Posted by Exarch View Post
    and the iranians have started accusing the US of being behind the cyber attack (guess investing in the cyber division was worth it eh)
    Actually they are blaming the Israelis. It contains code that is said to be uniquely Israeli.

    And why are you clinging to RT? That's just dumb. Multiple news sources have better analysis, minus the ridiculous.
    The fascists of the future will be called anti-fascists
    The best lack all conviction, while the worst are full of passionate intensity

  10. #10

    Default Re: Worst Cyber Attack In History: Malware "Flame" Discovered Targeting Middle Eastern Countries, Especially Iran

    Quote Originally Posted by BarnabyJones View Post
    Actually they are blaming the Israelis. It contains code that is said to be uniquely Israeli.
    If it was American code it would be a lot more bloated.
    "When I die, I want to die peacefully in my sleep, like Fidel Castro, not screaming in terror, like his victims."

    My shameful truth.

  11. #11
    s.rwitt's Avatar Shamb Conspiracy Member
    Join Date
    Jun 2007
    Location
    Lubbock, Tx
    Posts
    21,514

    Default Re: Worst Cyber Attack In History: Malware "Flame" Discovered Targeting Middle Eastern Countries, Especially Iran

    And you all thought we'd have to use airstrikes...

  12. #12
    mrmouth's Avatar flaxen haired argonaut
    Join Date
    Apr 2007
    Location
    Chicago
    Posts
    10,741

    Default Re: Worst Cyber Attack In History: Malware "Flame" Discovered Targeting Middle Eastern Countries, Especially Iran

    Quote Originally Posted by s.rwitt View Post
    And you all thought we'd have to use airstrikes...
    Yeah, we are obviously trying to avoid dealing with this militarily. We were actually supposed to attack Iran many times, but those nefarious reporters always smash our plans.

    I have no problem in hacking/cracking a country like Iran. Or more specifically a government and nuclear program like Iran. Along with unique support for Israel, we could prevent an exchange.


    How a U.S. Radar Station in the Negev Affects a Potential Israel-Iran Clash

    The small, rectangular-shaped portable radar peeking around a concrete blast wall is so advanced it can see over the horizon, and so sensitive it can spot a softball tossed in the air from 2,900 miles away. (Tehran is a mere 1,000 miles away to the northwest.) On Mt. Keren, the X-band radar is indeed pointed northwest, toward Iran, where it could detect a Shahab-3 missile launched toward Israel just seconds into its flight — and six to seven minutes earlier than Israel would know from its own radar, called Green Pine.
    The fascists of the future will be called anti-fascists
    The best lack all conviction, while the worst are full of passionate intensity

  13. #13
    MathiasOfAthens's Avatar Comes Rei Militaris
    Join Date
    Nov 2006
    Location
    Stockholm, Sverige
    Posts
    22,877

    Default Re: Worst Cyber Attack In History: Malware "Flame" Discovered Targeting Middle Eastern Countries, Especially Iran

    America, yeah.

  14. #14
    Indefinitely Banned
    Join Date
    Nov 2007
    Posts
    21,467

    Default Re: Worst Cyber Attack In History: Malware "Flame" Discovered Targeting Middle Eastern Countries, Especially Iran

    Quote Originally Posted by BarnabyJones View Post
    Actually they are blaming the Israelis. It contains code that is said to be uniquely Israeli.

    And why are you clinging to RT? That's just dumb. Multiple news sources have better analysis, minus the ridiculous.
    i use a lot of new sources outside of the mainstream.

    anyhoo,

    the iranians appear to have fixed the problem:
    http://www.bbc.co.uk/news/technology-18253331

    indicating that their own cyber division perhaps isn't too shabby.

    anyhoo, the ppl at Sophos say Flame appeared to have a specific target ie middle eastern countries, specifically iran. now who would want to target iran?

  15. #15
    Babur's Avatar ز آفتاب درخشان ستاره می
    Join Date
    Jun 2007
    Location
    Agra,Hindustan
    Posts
    15,405

    Default Re: Worst Cyber Attack In History: Malware "Flame" Discovered Targeting Middle Eastern Countries, Especially Iran

    Quote Originally Posted by Exarch View Post
    i use a lot of new sources outside of the mainstream.
    you mean from the fringe of new sources? RT gives a platform to truthers among other conspiracy theorists

    http://www.economist.com/blogs/easte...today_goes_mad

    RT seems quite deluded:

    In Russia you have democracy so it is much easier to infiltrate certain organizations as in the 1990s in an operation called Barbarossa-2. They used the NGOs, the American Aid, the International Monetary Fund, the George Soros Organization to try and actually infiltrate and destroy Russian society from within. Today, the US government is building 13 secret bases in Afghanistan for the forward push to an eventual war against Russia.
    please use a more credible source
    Under the patronage of Gertrudius!

  16. #16
    s.rwitt's Avatar Shamb Conspiracy Member
    Join Date
    Jun 2007
    Location
    Lubbock, Tx
    Posts
    21,514

    Default Re: Worst Cyber Attack In History: Malware "Flame" Discovered Targeting Middle Eastern Countries, Especially Iran

    Quote Originally Posted by Exarch View Post
    i use a lot of new sources outside of the mainstream.

    anyhoo,

    the iranians appear to have fixed the problem:
    http://www.bbc.co.uk/news/technology-18253331

    indicating that their own cyber division perhaps isn't too shabby.
    No, the Iranians appear to have claimed to have fixed the problem.

  17. #17
    Sir Pignans's Avatar The bringer of cheese.
    Join Date
    Feb 2009
    Location
    London
    Posts
    6,107

    Default Re: Worst Cyber Attack In History: Malware "Flame" Discovered Targeting Middle Eastern Countries, Especially Iran

    Quote Originally Posted by s.rwitt View Post
    No, the Iranians appear to have claimed to have fixed the problem.
    Considering that they appear to have discovered it in April, it means they've had like a month of attempting to break it. Doesn't seem to unreasonable to say they've beat it. I hear it's easier to write something to destroy a virus than to write a new virus.
    90% of teens would die today if facebook was destroyed. if you are one of the 10% that would be laughing, copy and paste this to your signature.

    My Political Profile.

    Under the patronage of Gertrudius!

  18. #18
    s.rwitt's Avatar Shamb Conspiracy Member
    Join Date
    Jun 2007
    Location
    Lubbock, Tx
    Posts
    21,514

    Default Re: Worst Cyber Attack In History: Malware "Flame" Discovered Targeting Middle Eastern Countries, Especially Iran

    Quote Originally Posted by Sir Pignans View Post
    Considering that they appear to have discovered it in April, it means they've had like a month of attempting to break it. Doesn't seem to unreasonable to say they've beat it. I hear it's easier to write something to destroy a virus than to write a new virus.
    Well, if it's as much worse than that last one as everyone's been saying, I HIGHLY doubt they're anywhere close. I can, of course understand how important it is to them for their neighbors to believe they are able to defeat such things.

  19. #19
    Blaze86420's Avatar Praepositus
    Join Date
    Feb 2008
    Location
    Alberta, Canada
    Posts
    5,091

    Default Re: Worst Cyber Attack In History: Malware "Flame" Discovered Targeting Middle Eastern Countries, Especially Iran

    Imagine if a cyber terrorist organization comes into existence, and all they do is just steal ultra classified data and wreak havoc all over the world.

  20. #20

    Default Re: Worst Cyber Attack In History: Malware "Flame" Discovered Targeting Middle Eastern Countries, Especially Iran

    Quote Originally Posted by Blaze86420 View Post
    Imagine if a cyber terrorist organization comes into existence, and all they do is just steal ultra classified data and wreak havoc all over the world.
    Some say they already exist.


    All it really means is inconvenience, not a real threat to anyone's quality of life or existence. It just means big organizations will have to use more secure networks. The most important computers in the world are only accessible through local human input devices anyway, and the only way to hack them is to break into the power plant, police headquarters or whatever building that contains them, and use a keyboard and mouse.
    Last edited by removeduser_4536284751384; May 30, 2012 at 01:38 PM.

Page 1 of 3 123 LastLast

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •