The ongoing investigation into the Flame malware has traced the development of the Flame platform back in 2006.
According to research by Kaspersky Lab, Symantec, CERT-Bund/BSI and the International Telecommunication Union’s Impact Alliance, the development of Flame’s command and control (C&C) platform began as early as December 2006. This is much earlier than researchers initially thought; the first reports placed Flame’s development in 2010. Later, it was discovered that some domains used by Flame were registered in 2008. An analysis of the malware’s C&C servers however revealed that developers had left internal timestamps and their nicknames in scripts.
“From this, we can conclude that the first C&C files were created on 03 December 2006, which means that the Flame platform is much older than we originally estimated,” according to Kaspersky Lab. “There were four people responsible for this C&C development. It is obvious to us that one of them…was more experienced than the others. He coded some very smart patches and implemented complex logics; in addition, he seems to be a master of encryption algorithms.”
The analysis also revealed unidentified pieces of malware that were being managed by the servers as well.
“Command-and-control happens through a Web application called Newsforyou,” according to Symantec’s Security Response team. “The application processes the W32.Flamer client interactions and provides a simple control panel. The control panel allows the attackers to upload packages of code, to deliver to compromised computers, and to download packages containing stolen client data. This application does not appear to be exclusively used by Flamer. It contains functionality that allows it to communicate with computers compromised with multiple malware identifiers using different protocols.”
Several threats supported by this framework are still unknown, Symantec said, speculating that they are most likely unknown variants of Flame or totally distinct malware. There is no sign the Flame servers were used to control Stuxnet or Gauss.
“The servers were set up to record minimal amounts of information in case of discovery,” according to Symantec. “The systems were configured to disable any unnecessary logging events and entries in the database were deleted at regular intervals. Existing log files were securely deleted from the server on a regular basis. These steps were taken in order to hamper any investigation should the server be acquired by third parties.”
Flame, which has been called a cyber-espionage tool by researchers, was discovered in May during an investigation initiated by the International Communciation Union. Since then, reports have surfaced linking it to the infamous Stuxnet malware uncovered in 2010.
“It was problematic for us to estimate the amount of data stolen by Flame, even after the analysis of its Command and Control servers,” Alexander Gostve, chief security expert at Kaspersky Lab, said in a statement. “Flame’s creators are good at covering their tracks. But one mistake of the attackers helped us to discover more data that one server was intended to keep. Based on this we can see that more than five gigabytes of data was uploaded to this particular server a week, from more than 5,000 infected machines. This is certainly an example of cyber espionage conducted on a massive scale.”
More from Brian Prince
- U.S. Healthcare Companies Hardest Hit by ‘Stegoloader’ Malware
- CryptoWall Ransomware Cost Victims More Than $18 Million Since April 2014: FBI
- New Adobe Flash Player Flaw Shares Similarities With Previous Vulnerability: Trend Micro
- Visibility Challenges Industrial Control System Security: Survey
- Adobe Flash Player Zero-Day Exploited in Attack Campaign
- Researchers Demonstrate Stealing Encryption Keys Via Radio
- Researchers Uncover Critical RubyGems Vulnerabilities
- NSA, GCHQ Linked to Efforts to Compromise Antivirus Vendors: Report
Latest News
- Microsoft: Iran Unit Behind Charlie Hebdo Hack-and-Leak Op
- Feds Say Cyberattack Caused Suicide Helpline’s Outage
- Big China Spy Balloon Moving East Over US, Pentagon Says
- Former Ubiquiti Employee Who Posed as Hacker Pleads Guilty
- Cyber Insights 2023: Venture Capital
- Atlassian Warns of Critical Jira Service Management Vulnerability
- High-Severity Privilege Escalation Vulnerability Patched in VMware Workstation
- Exploitation of Oracle E-Business Suite Vulnerability Starts After PoC Publication
