Flame

Flame , [ ] také známý jako Flamer , sKyWIper , [ b ] a Skywiper , [ 2 ] je modulární počítač malwareobjevil v roce 2012 [ 3 ] [ 4 ] , který útočí počítačů se systémem na Microsoft Windows operační systém. [5 ] Program je se používá pro cílené počítačové špionáže v středovýchodních zemích. [ 1 ] [ 5 ] [ 6 ]

Jeho objev byl oznámen dne 28. května 2012 o Maher centrum íránského národního Emergency Response Team Computer (CERT), [ 5 ] Kaspersky Lab [ 6 ] a CrySyS Lab na budapešťské univerzitě technologie a ekonomiky . [ 1 ] poslední z nich uvedla, ve své zprávě, že "je jistě nejdokonalejší malware jsme se setkali během naší praxe, pravděpodobně, je to nejkomplexnější malware někdy našel." [ 1 ]

Flame může šířit do jiných systémů přes lokální síť (LAN) nebo přes USB . To může nahrávat audio,screenshoty , činnost klávesnice a provoz v síti . [ 6 ] Program také zaznamenává Skype konverzace a může se infikovaných počítačů do Bluetooth majáků, které se snaží stáhnout kontaktní informace z okolních zařízení Bluetooth. [ 7 ] Tyto údaje, společně s lokálně uložených dokumentů, je poslán na jednom z několika velení a řízení serverů, které jsou roztroušeny po celém světě. Program pak čeká na další instrukce z těchto serverů. [ 6 ]

Podle odhadů Kaspersky 05. 2012, Flame zpočátku infikován přibližně 1000 strojů, [ 7 ] s oběťmi, včetně nevládních organizací, vzdělávacích institucí a soukromých osob. [ 6 ] V té době 65% infekcí se stalo v Íránu, Izrael, Súdán , Sýrie, Libanon, Saúdská Arábie a Egypt, [ 3 ] [ 6 ] s "obrovskou většinou cílů" v Íránu. [ 8 ] Flame byla také hlášena v Evropě a Severní Americe. [ 9 ] Flame podporuje "zabít "Příkaz, který stírá veškeré stopy malware z počítače. Počáteční infekce Flame přestal provozovat po jeho veřejném působení, a "kill" Příkaz byl odeslán. [ 10 ]

 Historie

Flame byl identifikován května 2012 o Maher centrum íránské národní CERT, Kaspersky Lab a CrySyS Lab (Laboratoř kryptografii a bezpečnostní systém) na budapešťské univerzitě technologie a ekonomiky, kdy byla společnost Kaspersky Lab požádal OSN Unie telekomunikační International , aby prošetřila zprávy viru ovlivňující íránské ministerstvo ropného průmyslu počítačů. [ 7 ] Jak Kaspersky Lab šetření, které objevil MD5 hash a název souboru, který se objevil pouze na přání zákazníka strojů z Middle východní národy. Po zjištění více kusů, výzkumníci daboval programu "plamen" po názvu jednoho z jeho modulů. [ 7 ]

Podle Kaspersky, Flame byl provoz v přírodě, protože přinejmenším únoru 2010. [ 6 ] CrySyS Lab uvádí, že název souboru hlavní složky byl pozorován již v prosinci 2007. [ 1 ] Nicméně, mohl by být vytvoření datum nebude stanoveny přímo, neboť tvorba termíny pro malware je modulů falešně nastaveny na data již v roce 1994. [ 7 ]

Computer experts consider it the cause of an attack in April 2012 that caused Iranian officials to disconnect their oil terminals from the Internet.[11] At the time the Iranian Students News Agency referred to the malware that caused the attack as "Wiper", a name given to it by the malware's creator.[12]However, Kaspersky Lab believes that Flame may be "a separate infection entirely" from the Wiper malware.[7] Due to the size and complexity of the program—described as "twenty times" more complicated than Stuxnet—the Lab stated that a full analysis could require as long as ten years.[7]

On 28 May, Iran's CERT announced that it had developed a detection program and a removal tool for Flame, and had been distributing these to "select organizations" for several weeks.[7] After Flame's exposure in news media, Symantec reported on 8 June that some Flame command and control (C&C) computers had sent a "suicide" command to infected PCs to remove all traces of Flame.[10]

According to estimates by Kaspersky in May 2012, initially Flame had infected approximately 1,000 machines,[7] with victims including governmental organizations, educational institutions and private individuals.[6] At that time the countries most affected were Iran, Israel, Sudan, Syria, Lebanon, Saudi Arabia, and Egypt.[3][6]

[edit] Operation

NameDescription
List of code names for various families of modulesin Flame's source code and their possiblepurpose[1]

Flame

Modules that perform attack functions

Boost

Information gathering modules

Flask

A type of attack module

Jimmy

A type of attack module

Munch

Installation and propagation modules

Snack

Local propagation modules

Spotter

Scanning modules

Transport

Replication modules

Euphoria

File leaking modules

Headache

Attack parameters or properties

Flame is an uncharacteristically large programfor malware at 20 megabytes. It is written partly in the Lua scripting language with compiled C++ code linked in, and allows other attack modules to be loaded after initial infection.[6][13] The malware uses five different encryption methods and an SQLite database to store structured information.[1] The method used to inject code into various processes is stealthy, in that the malware modules do not appear in a listing of the modules loaded into a process and malware memory pages are protected with READ, WRITE and EXECUTE permissions that make them inaccessible by user-mode applications.[1] The internal code has few similarities with other malware, but exploits two of the same security vulnerabilties used previously by Stuxnet to infect systems.[c][1] The malware determines what antivirus software is installed, then customises its own behaviour (for example, by changing the filename extensions it uses) to reduce the probability of detection by that software.[1] Additional indicators of compromise include mutex and registry activity, such as installation of a fake audio driver which the malware uses to maintain persistence on the compromised system.[13]

Flame is not designed to deactivate automatically, but supports a "kill" function that makes it eliminate all traces of its files and operation from a system on receipt of a module from its controllers.[7]

Flame was signed with a fraudulent certificate purportedly from the Microsoft Enforced Licensing Intermediate PCA certificate authority.[14] The malware authors identified a Microsoft Terminal ServerLicensing Service certificate that inadvertently was enabled for code signing and that still used the weakMD5 hashing algorithm, then produced a counterfeit copy of the certificate that they used to sign some components of the malware to make them appear to have originated from Microsoft.[14] A successfulcollision attack against a certificate was previously demonstrated in 2008,[15] but Flame implemented a new variation of the chosen-prefix collision attack.[16]


 

[edit] Deployment

Like the previously known cyber weapons Stuxnet and Duqu, it is employed in a targeted manner and can evade current security software through rootkit functionality. Once a system is infected, Flame can spread to other systems over a local network or via USB stick. It can record audio, screenshots, keyboard activity and network traffic.[6] The program also records Skype conversations and can turn infected computers into Bluetooth beacons which attempt to download contact information from nearby Bluetooth enabled devices.[7] This data, along with locally stored documents, is sent on to one of several command and control servers that are scattered around the world. The program then awaits further instructions from these servers.[6]

Unlike Stuxnet, which was designed to sabotage an industrial process, Flame appears to have been written purely for espionage.[17] It does not appear to target a particular industry, but rather is "a complete attack toolkit designed for general cyber-espionage purposes".[18]

Using a technique known as sinkholing, Kaspersky demonstrated that "a huge majority of targets" were within Iran, with the attackers particularly seeking AutoCAD drawings, PDFs, and text files.[8]Computing experts said that the program appeared to be gathering technical diagrams for intelligence purposes.[8]

A network of 80 servers across Asia, Europe and North America has been used to access the infected machines remotely.[19]

[edit] Origin

On June 19, 2012, The Washington Post published an article claiming that Flame was jointly developed by the U.S. National Security Agency, CIA and Israel’s military at least five years prior. The project was said to be part of a classified effort code-named Olympic Games, which was intended to collect intelligence in preparation for a cyber-sabotage campaign aimed at slowing Iranian nuclear efforts.[20]

According to Kaspersky's chief malware expert, "the geography of the targets and also the complexity of the threat leaves no doubt about it being a nation-state that sponsored the research that went into it."[3]Kaspersky initially said that the malware bears no resemblance to Stuxnet, although it may have been a parallel project commissioned by the same attackers.[21] After analysing the code further, Kaspersky later said that there is a strong relationship between Flame and Stuxnet; the early version of Stuxnet contained code to propagate via USB drives that is nearly identical to a Flame module that exploits the same zero-day vulnerability.[22]

Iran's CERT described the malware's encryption as having "a special pattern which you only see coming from Israel".[23] The Daily Telegraph reported that due to Flame's apparent targets—which included Iran, Syria, and the West Bank—Israel became "many commentators' prime suspect". Other commentators named China and the U.S. as possible perpetrators.[21] Richard Silverstein, a commentator critical of Israeli policies, stated that he had confirmed with a "senior Israeli source" that the malware was created by Israeli computer experts.[21][24] The Jerusalem Post wrote that Israel's Vice Prime MinisterMoshe Ya'alon appeared to have hinted that his government was responsible,[21] but an Israeli spokesperson later denied that this had been implied.[25] Unnamed Israeli security officials suggested that the infected machines found in Israel may imply that the virus could be traced to the U.S. or other Western nations.[26] The U.S. has officially denied responsibility.[27]