Go Back   nV News Forums > General Forums > Archived News Items

Newegg Daily Deals

Reply
 
Thread Tools
Old 06-04-12, 05:20 PM   #1
News
Registered User
 
Join Date: Jun 2009
Posts: 51,711
Post Iran-targeting Flame malware used huge network to steal blueprints

Kaspersky Lab


Attackers behind the Flame espionage malware that targeted computers in Iran used more than 80 different domain names to siphon computer-generated designs, PDF files, and e-mail from its victims, according to a new analysis from researchers who helped discover the threat.

The unknown authors of Flame shut down the sprawling command-and-control (C&C) infrastructure immediately after last Monday's disclosure that the highly sophisticated malware had remained undetected for at least two years on computers belonging to government-run organizations, private companies, and others. The 80 separate domain names were registered using a huge roster of fake identities, and some of the addresses were secured more than four years ago.

"The Flame C&C domains were registered with an impressive list of fake identities and with a variety of registrars, going back as far as 2008," Kaspersky Lab expert Alexander Gostev wrote in a blog post published Monday. "In general, each fake identity registered only 2-3 domains, but there are some rare cases when a fake identity registered up to 4 domains."

Read more | Comments






More...
News is offline   Reply With Quote
Reply


Thread Tools

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump


Similar Threads
Thread Thread Starter Forum Replies Last Post
Ubuntu and Unity, Google reCAPTCHA hacked, and Flame spy malware News Archived News Items 0 06-02-12 10:40 AM

All times are GMT -5. The time now is 06:04 PM.


Powered by vBulletin® Version 3.7.1
Copyright ©2000 - 2014, Jelsoft Enterprises Ltd.
Copyright 1998 - 2014, nV News.