Newsletters
The Enterprise Security Supersite NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Please click for more information, or scroll down to pass the ad, or Close Ad.
Home Network Security Viruses & Malware Hackers Security Solutions More Topics...
Vblock™ Systems:
Advanced converged infrastructure
increases productivity & lowers costs.

www.vce.com
Network Security
24/7/365 Network Uptime
Average Rating:
Rate this article:  
Flame Coders Left Digital Fingerprints Behind
Flame Coders Left Digital Fingerprints Behind

By Jennifer LeClaire
September 17, 2012 4:19PM

Bookmark and Share
Unlike traditional cyber criminals who implement eye-candy Web interfaces which the average user can recognize as a botnet control panel, Kaspersky said, the developers of the Flame Command-and-Control servers made the Flame interface generic and unpretentious. "We believe this was deliberately done to deceive hosting company sys-admins."
 


Security researchers often play the role of Sherlock, but they don't always have such telling clues to sleuth. The hackers behind the Flame malware, which has been used in nation-state espionage attacks, have left a trail of hints that may help authorities tag the culprits.

The clues also point to evidence that the attack was under way and much broader than once thought.

Let's back up a minute. Known as W32.Flamer, Symantec describes this malware as a sophisticated cyber espionage tool. Flamer made headlines after cyber attacks on Middle Eastern countries earlier in 2012. Both Symantec and Kaspersky are now releasing new analyses of the command-and-control (C&C) servers used in those attacks.

"The servers were set up on March 25, 2012, and May 18, 2012, respectively. On both occasions, within only a few hours of the server being setup, the first interaction with a computer compromised with Flamer was recorded," Symantec wrote in its blog. "The servers would go on to control at least a few hundred compromised computers over the next few weeks of their existence."

No Exclusivity

Symantec goes on to reveal that the servers contained the same control framework, but were used for distinct purposes. Symantec estimates the server that was set up in March, for example, collected almost 6 GB of data from compromised computers in just over a week. By contrast, the security firm reports, the server that was set up in May 2012 received just 75 MB of data and was used solely to distribute one command module to the compromised computers.

"Command-and-control happens through a Web application called Newsforyou. The application processes the W32.Flamer client interactions and provides a simple control panel. The control panel allows the attackers to upload packages of code to deliver to compromised computers, and to download packages containing stolen client data," Symantec said.

"This application does not appear to be exclusively used by Flamer. It contains functionality that allows it to communicate with computers compromised with multiple malware identifiers using different protocols."

Script-Kiddies?

For its part, Kaspersky reveals that a European company with data centers in another European Union country own one of the C&C servers it analyzed. Kaspersky managed to get a server image that was an OpenVZ file-system container.

"Our first impression was that the control panel appeared to be implemented by script-kiddies. It looked like a very early alpha version of a botnet C&C control panel," Kaspersky wrote in its blog. "However, revisiting this picture one more time made everything clear -- the attackers deliberately chose this interface."

Unlike traditional cyber-criminals who implement eye-candy Web interfaces which the average user can easily recognize as a botnet control panel, the security firm said, the developers of the Flame C&C made it very generic and unpretentious.

"The C&C developers didn't use professional terms such as bot, botnet, infection, malware-command or anything related in their control panel. Instead they used common words like data, upload, download, client, news, blog, ads, backup etc.," Kaspersky said. "We believe this was deliberately done to deceive hosting company sys-admins who might run unexpected checks."
 

Tell Us What You Think
Comment:

Name:



APC has an established a reputation for solid products that virtually pay for themselves upon installation. Who has time to spend worrying about system downtime? APC makes it easy for you to focus on business growth instead of business downtime with reliable data center systems and IT solutions. Learn more here.


 Network Security
1.   Verizon Report Exposes Cyberthreats
2.   How Are Web Sites Post-Heartbleed?
3.   White House Updating Privacy Policy
4.   Target Hackers May Be Tough To Find
5.   Heartbleed Exploit Could Cost Millions


advertisement
How Are Web Sites Post-Heartbleed?
Questions on open source, security.
Average Rating:
Heartbleed Exploit Could Cost Millions
But it could have been prevented.
Average Rating:
Michaels: Nearly 3M Cards Breached
But the hack has been contained.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Verizon Data Breach Report Exposes Top Threats
Beyond Heartbleed, there are cyberthreats vying to take down enterprise networks, corrupt smartphones, and wreak havoc on businesses. Verizon is exposing these threats in a new report.
 
Where Do Web Sites Stand, Post-Heartbleed?
A security firm says the vast majority of Web sites have patched themselves to protect against the Heartbleed bug, but now there are questions raised on the reliability of open-source programs.
 
White House Updating Online Privacy Policy
A new Obama administration privacy policy explains how the government will gather the user data of online visitors to WhiteHouse.gov, mobile apps and social media sites, saying much is in the public domain.
 

Navigation
Enterprise Security Today
Home/Top News | Network Security | Viruses & Malware | Hackers | Security Solutions | Mobile Security | Disaster Recovery | Windows Security
Data Security | EST Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters | XML/RSS Feed

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.