We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
80,108 News Articles

'Flame' one of four mystery cyberweapons, says Kaspersky Lab

Development goes back to 2006

Security experts have discovered tantalising evidence that the eerily sophisticated Flame cyberweapon discovered in May was part of a family of four programs whose development goes back to 2006.

An analysis of Flame's Command and Control (C&C) servers by Kaspersky Lab in conjunction with Symantec, Germany's CERT-Bund/BSI and ITU-IMPACT found a stripped-down interface which had been designed to attract as little attention as possible from hosting admins who chanced upon it.

Although all commands were uploaded as server scripts rather than through a GUI, the team found the protocol handlers referenced four clients', SP, SPE, FL and IP, where 'FL' is understood to relate to Flame (a previous analysis identified 'Flame' as its most likely name from text buried in its code).

This leaves the mystery of the three unidentified clients; as far as Kaspersky can tell none of them are references to Stuxnet or Gauss, two other cyberweapons already pulled apart by its researchers.

"Obviously, this means there are at least three other undiscovered cyber-espionage or cyber-sabotage tools created by the same authors: SP, SPE and IP," says Kaspersky Lab.

Evidence has been mounting that cyberweapons have been around for a lot longer than realised and the latest analysis backs that up. Scripts appear to have been run from four different authors going back as far as December 2006.

This might explain why Flame itself was so vast and complex by malware standards, comprising 20 or more modules, a sign of a longstanding development.

Data stolen by the malware was removed on a regular schedule after being carefully encrypted using PKI, making recovery of the content impossible even some were found. But it was pilfering huge volumes of data nonetheless, 5GB in a single week at one point.

On the basis of infected IPs connecting to the C&C, Kaspersky reckons that the number of 'victims' of Flame must have exceeded 10,000, with the most likely targets being Iran (3702 bot IPs) and Sudan (1280 bot IPs) connecting during a seven-day period in March 2012.

Where does all this leave cyberweapons research? The most likely protagonists are the US and Israel, which have been using covert software for more than half a decade on a previously unsuspected scale. These programs certainly pre-date the current Obama administration.

A few sippets have emerged to explain what Flame was for with one claim being that it was an intelligence-gathering tool to aid the 2010 Stuxnet attacks on Iran's nuclar installations.


IDG UK Sites

Windows 9 release date, price, features: Microsoft teases new OS ahead of 30 September unveiling

IDG UK Sites

From the iPhone 6 to the iWatch and a new Apple TV we look at the products Apple is set to launch...

IDG UK Sites

September 2014 creative trends: 5 things you must see

IDG UK Sites

What to expect from Apple in autumn/winter 2014: iPhone 6, iPhone Air, iWatch, iPad 6, new Apple...