Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

'Flame' one of four mystery cyberweapons, says Kaspersky Lab

Development goes back to 2006

Article comments

Security experts have discovered tantalising evidence that the eerily sophisticated Flame cyberweapon discovered in May was part of a family of four programs whose development goes back to 2006.

An analysis of Flame’s Command and Control (C&C) servers by Kaspersky Lab in conjunction with Symantec, Germany’s CERT-Bund/BSI and ITU-IMPACT found a stripped-down interface which had been designed to attract as little attention as possible from hosting admins who chanced upon it.

Although all commands were uploaded as server scripts rather than through a GUI, the team found the protocol handlers referenced four clients’, SP, SPE, FL and IP, where ‘FL’ is understood to relate to Flame (a previous analysis identified ‘Flame’ as its most likely name from text buried in its code).

This leaves the mystery of the three unidentified clients; as far as Kaspersky can tell none of them are references to Stuxnet or Gauss, two other cyberweapons already pulled apart by its researchers.

“Obviously, this means there are at least three other undiscovered cyber-espionage or cyber-sabotage tools created by the same authors: SP, SPE and IP,” says Kaspersky Lab.

Evidence has been mounting that cyberweapons have been around for a lot longer than realised and the latest analysis backs that up. Scripts appear to have been run from four different authors going back as far as December 2006.

This might explain why Flame itself was so vast and complex by malware standards, comprising 20 or more modules, a sign of a longstanding development.

Data stolen by the malware was removed on a regular schedule after being carefully encrypted using PKI, making recovery of the content impossible even some were found. But it was pilfering huge volumes of data nonetheless, 5GB in a single week at one point.

On the basis of infected IPs connecting to the C&C, Kaspersky reckons that the number of ‘victims’ of Flame must have exceeded 10,000, with the most likely targets being Iran (3702 bot IPs) and Sudan (1280 bot IPs) connecting during a seven-day period in March 2012.

Where does all this leave cyberweapons research? The most likely protagonists are the US and Israel, which have been using covert software for more than half a decade on a previously unsuspected scale. These programs certainly pre-date the current Obama administration.

A few sippets have emerged to explain what Flame was for with one claim being that it was an intelligence-gathering tool to aid the 2010 Stuxnet attacks on Iran's nuclar installations.


More from Techworld

More relevant IT news


Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map

* *