Iran Hit by New Cyber Virus

Following a report by Russian experts, Iran confirmed on May 28 that a new cyber virus codenamed “Flame” had penetrated Iran’s computer system. The new virus is unlike earlier worms because it was designed to steal information rather than to destroy systems, according to the first report issued by Russia’s Kaspersky Lab.
 
The report concluded, “The complexity and functionality of the newly discovered malicious program exceed those of all other cyber menaces known to date,” including Stuxnet, which damaged the centrifuges involved in Iran’s controversial nuclear program. Flame was unleashed at least two years ago, the Russian report claimed. The website also reported:
 
The primary purpose of Flame appears to be cyber espionage, by stealing information from infected machines. Such information is then sent to a network of command-and-control servers located in many different parts of the world. The diverse nature of the stolen information, which can include documents, screenshots, audio recordings and interception of network traffic, makes it one of the most advanced and complete attack-toolkits ever discovered. The exact infection vector has still to be revealed, but it is already clear that Flame has the ability to replicate over a local network using several methods, including the same printer vulnerability and USB infection method exploited by Stuxnet.
 
“One of the most alarming facts is that the Flame cyber-attack campaign is currently in its active phase, and its operator is consistently surveilling infected systems, collecting information and targeting new systems to accomplish its unknown goals,” said Alexander Gostev, Chief Security Expert at Kaspersky Lab on the Kaspersky Lab website.
 
The Russian report claimed that Iran was the hardest hit country but that Flame had also infected Israel/Palestine as well as Syria, Saudi Arabia, Sudan, Lebanon and Egypt. The full report can be found at: http://www.kaspersky.com/about/news/virus/2012/Kaspersky_Lab_and_ITU_Research_Reveals_New_Advanced_Cyber_Threat
 
Iran’s Computer Emergency Response Team Coordination Center confirmed the attack on its website, but provided limited details. It said Flame appeared to have a “close relation” to the earlier Stuxnet and Duqu system attacks on Iranian computers. “The research on these samples implies that the recent incidents of mass data loss in Iran could be the outcome of some installed module of this threat,” it said.
 
 The Iranian website reported that Flame was able to do the following operations:
·    Distribution via removable medias
·    Distribution through local networks
·    Network sniffing, detecting network resources and collecting lists of vulnerable passwords
·    Scanning the disk of infected system looking for specific extensions and contents
·    Creating series of user’s screen captures when some specific processes or windows are active
·    Using the infected system’s attached microphone to record the environment sounds
·    Transferring saved data to control servers
·    Using more than 10 domains as C&C servers
·    Establishment of secure connection with C&C servers through SSH and HTTPS protocols
·    Bypassing tens of known antiviruses, anti malware and other security software
·    Capable of infecting Windows Xp, Vista and 7 operating systems
·    Infecting large scale local networks
  
On May 29, the Iran website announced the release of a cyber tool to both detect and remove the Flame virus.  The full Iranian report is available at: http://www.certcc.ir/index.php?newlang=eng