Blog Posts Tagged with "Flame"

0a8cae998f9c51e3b3c0ccbaddf521aa

The Dangers of Chasing the Next Flame [Malware]

June 05, 2012 Added by:Rafal Los

Are we under cyber attack? Yes - but we have been aware of this for quite some time. Is there an escalation in the ferocity with which complex organizations are being attacked by unknown parties? Absolutely. But if you don't have your enterprise resiliency fundamentals in order, who really cares...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

W32.Flamer Used Spoofed Microsoft Digital Certificates

June 04, 2012 Added by:Headlines

"We have discovered through our analysis that some components of the malware have been signed by certificates that allow software to appear as if it was produced by Microsoft. We identified that an older cryptography algorithm could be exploited and then be used to sign code as if it originated from Microsoft..."

Comments  (0)

8a958994958cdf24f0dc051edfe29462

Flame Virus: A Controlled Burn?

June 02, 2012 Added by:Larry Karisny

What Flame is doing in the Middle East attacks can be done in other countries, even the ones releasing the attack. The technical nature of computer virus propagation could leak the virus to unintended areas, as happened with Stuxnet. Playing with these vulnerabilities is like playing with fire...

Comments  (1)

850c7a8a30fa40cf01a9db756b49155a

Flamer: I Can Haz Propaganda...

May 31, 2012 Added by:J. Oquendo

Studies on malware by vendors are not being done for anything other than being able to state: "We can defend you from MalwareX if you purchase Product Y." This is the reality of it. What better mechanism to do so than to paint the boogeyman as a rogue country. After all, countries spend millions on security...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Cyberwar Threats and Critical Infrastructure Vulnerabilities

May 31, 2012 Added by:Headlines

"Targeted attacks are increasing dramatically. It could be state sponsored or it could be just hacktivists or it could be a cyber criminal organisation. But we know the number one target is government institutions and the second is manufacturing, including oil and gas..."

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Flame Malware: From Genesis to the Conspiracy Theory

May 31, 2012 Added by:Plagiarist Paganini

Some antivirus providers were ready with a fix for Flame. This information, together with evidence that the malware dates to at least 2010, would lead me to believe that the major security companies were aware of Flame and have been silent because of agreements with Western governments...

Comments  (2)

Aadb52f9100e0d31264fb3ce9e3d2536

Flame: Implications vs. Speculation

May 30, 2012 Added by:Robert M. Lee

Attribution is incredibly hard to apply in the cyber domain, and even the most appealing pieces of evidence can be purposely misleading. The perception of attribution applied to a nation-state cyber attack can put tension on nation-state relationships, have an effect on deterrence, and cause real-world issues...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Symantec Flame Analysis: A Sophisticated and Discreet Threat

May 30, 2012 Added by:Headlines

"The modular nature of this malware suggests that a group of developers have created it with the goal of maintaining the project over a long period of time; very likely along with a different set of individuals using the malware. The architecture... allows the authors to change functionality and behavior"...

Comments  (0)

296634767383f056e82787fcb3b94864

Kaspersky's Problematic Flame Analysis

May 29, 2012 Added by:Jeffrey Carr

I'm beginning to wonder what's going on over at Kaspersky Labs. Kaspersky Labs has called a virus whose only purpose is to steal data a "cyber weapon". Come on, guys. Espionage is not warfare and never has been. Hence a tool created solely to conduct cyber espionage cannot also be legitimately called a cyber weapon...

Comments  (0)

Ba829a6cb97f554ffb0272cd3d6c18a7

Flame: Another Holiday, Another Super Virus

May 29, 2012 Added by:Kevin McAleavey

Flame is huge - 20 modules and 20 megabytes. Strange that the infector is an ActiveX control in the form of an OCX (OLE Control Extensions) file which apparently has run completely undetected for years. The worm runs as a Windows service, and most of the files are visible, making this even more of a surprise...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Flame Trojan Ignites Cyberwar Chatter

May 29, 2012 Added by:Headlines

"Flame shares many characteristics with notorious cyber weapons Duqu and Stuxnet: while its features are different, the geography and careful targeting of attacks coupled with the usage of specific software vulnerabilities seems to put it alongside those familiar super-weapons currently deployed in the Middle East.."

Comments  (0)

Page « < 1 - 2 > »