Blog Posts Tagged with "Flame"

03b2ceb73723f8b53cd533e4fba898ee

Elderwood Project: Who is Behind Aurora and Ongoing Attacks?

September 10, 2012 Added by:Pierluigi Paganini

The attacks appeared to be originated in China and aimed at dozens of other organizations who were hit, of which Adobe Systems and Juniper Networks confirmed the incident. The press is also convinced that other companies were targeted such as Morgan Stanley, Northrop Grumman and Yahoo...

Comments  (0)

68b48711426f3b082ab24e5746a66b36

Stuxnet: The New Face of 21st Century Cyber Warfare

August 23, 2012 Added by:Fergal Glynn

In June of 2010 the Stuxnet worm made it’s debut. Joint engineered by the United States and Israel to cripple Iran’s nuclear efforts, it wasn’t long before the worm was altered and turned loose on the internet spawning a number of variations of the original worm and affecting computers around the world...

Comments  (1)

0ff0a77035f9569943049ed3e980bb0d

Giving Aid and Comfort to the Enemy

August 16, 2012 Added by:

Why do the likes of McAfee, Symantec, TrendMicro, Microsoft and Bitdefender publish reverse engineering code examples and analysis on cyber espionage and sabotage tools which serve to delay, disrupt, deny, and deceive our enemies from developing nuclear weapons. This is giving aid and comfort to the enemy...

Comments  (11)

7fef78c47060974e0b8392e305f0daf0

ICS-CERT: Gauss Information Stealing Malware

August 14, 2012 Added by:Infosec Island Admin

Kaspersky Lab recently released a report on a new information-stealing malware they have named “Gauss" which is designed to collect information and send the data to its command-and-control servers. Gauss was predominantly on systems in the Middle East, but has also been detected on networks in the US...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Gauss: Evidence of Ongoing Cyberwar and Espionage Campaigns

August 13, 2012 Added by:Pierluigi Paganini

Gauss collects network interface information, BIOS characteristics and computer drive details. Many ignore the aspect of modularity of the agent which may receive supplementary modules developed using the info acquired directly on the targets to conduct attacks against critical infrastructure...

Comments  (0)

Aadb52f9100e0d31264fb3ce9e3d2536

Stuxnet and Cyber Deterrence

August 13, 2012 Added by:Robert M. Lee

Stuxnet showed that a nation-state was capable and willing to use an advanced cyber weapon against an adversary. With the world believing that the United States is responsible, the nation now has the highest level of credibility for willingness and capability to develop and use a cyber weapon. That is a strong deterrent...

Comments  (23)

7fef78c47060974e0b8392e305f0daf0

Malware Wars! Cyber-Wars! Cyber-Espionage-Wars! Oh My...

August 11, 2012 Added by:Infosec Island Admin

We have opened Pandora’s box and there is no way to get what has escaped back in. We have given the weapon framework away due to the nature of the carrier. Even if Gauss is encrypted, it will be broken and then what? Unlike traditional weapons that destroy themselves, the malware we have sent can be reverse engineered...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Stuxnet, Flame, Duqu Less Dangerous than Conventional Attacks

June 21, 2012 Added by:Headlines

“Our advice to ICS and SCADA network managers is to be informed of new threats like Flame, but be especially vigilant against the more conventional, widely understood threats. In all likelihood, a simple denial-of-service attack has a better chance of wreaking havoc on their network than Stuxnet or Duqu"...

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

Microsoft, the CIA and NSA Collude to Take Over the Internet

June 20, 2012 Added by:J. Oquendo

The CIA, NSA and Microsoft created a completely separate operating system somewhere in the Beltway. Microsoft decided to give the agencies the specific code to make the rogue changes. Microsoft allowed the rogue system to be placed inside of their network and only allow a specific country to be infected...

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

Counterpoint to F-Secure: Flame is Still Lame

June 18, 2012 Added by:J. Oquendo

I would like to believe that most governments have enough of a clue to avoid walking into a house like a Ninja only to bubble wrap their feet. History has shown us that they do. Does this make them innocent with regards to Flame or Stuxnet, not really, but yields more questions that don't quite add up...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Microsoft May Be Infiltrated by Government Cyber Operatives

June 18, 2012 Added by:Headlines

“If there is an operation under way and being run by a US intelligence agency it would make perfect sense for them to plant moles inside Microsoft to assist in pulling it off... This makes you think that this breach of Microsoft's update system was done by someone like the NSA..." said F-Secure's Mikko Hypponen...

Comments  (0)

924ce315203c17e05d9e04b59648a942

Flame's MD5 Collision: Most Worrisome Security Discovery of 2012

June 15, 2012 Added by:Richard Stiennon

Stuxnet, Duqu and Flame have used false certificates to infiltrate a network. Action must be taken today to discover and root out MD5 certificates from the enterprise. We are beyond the proof of concept stage. Certificate attacks will be with us as long as MD5 based certificates are used to authenticate critical systems....

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

Flame: Cutting Through Media and SME Hype

June 14, 2012 Added by:J. Oquendo

Flame is a very loud piece of malware. It is a horrendous 20Mb contraption which screams: "look at me." Many of the components in Flame are borrowed, re-hashed, re-written and re-deployed. AV companies are suggesting there is "no financial gain" being sought by Flame and to that I state: "How would you know?"

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Cybergate: Stuxnet and Flame are Related

June 11, 2012 Added by:Joel Harding

Contrary to previous reports that Stuxnet and Flame were unrelated, the authors apparently worked together at one point. If this is the case we might begin looking for evidence of more code from Operation Olympic Games floating around. Flame provides a framework for future warfare in cyberspace...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Researchers: Flame Malware Shares Stuxnet Virus Module

June 11, 2012 Added by:Headlines

"Despite the fact that Stuxnet has been the subject of in-depth analysis... the mysterious 'resource 207' from 2009 has gone largely unnoticed. But it turns out that this is the missing link between Flame and Stuxnet... Clearly, these two pieces of exploit code were written by the same programmer..."

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

sKyWIper-Flame Malware Cryptographic Collision Attack

June 07, 2012 Added by:Infosec Island Admin

The sKyWIper malware uses a new cryptographic collision attack in combination with the terminal server licensing service certificates to sign code as if it came from Microsoft. However, code-signing without performing a collision is also possible. This is an avenue for compromise that may be used by additional attackers..

Comments  (0)

Page « < 1 - 2 > »