Security Experts:

Connect with us

Hi, what are you looking for?



‘MiniFlame’ Malware Another Link Between Flame, Gauss Espionage Attacks

Researchers at Kaspersky Lab say a tool first thought to be a module of the Flame malware is actually an independent piece of malware in its own right.

Researchers at Kaspersky Lab say a tool first thought to be a module of the Flame malware is actually an independent piece of malware in its own right.

Kaspersky Lab is calling the interoperable tool ‘miniFlame’. Designed to steal data and control compromised computers in the name of espionage, the malware was first discovered by Kaspersky Lab in July. During a more in-depth analysis of Flame’s command and control (C&C) in September however, they discovered the tool was not a module after all. Instead it actually could be used both as an independent malicious program or a plug-in for both Flame and Gauss – a fact the company said further proves there was cooperation between the creators of those two programs.

The discovery is the latest twist in the story of Flame and Gauss, espionage tools discovered by security pros earlier this year. Both pieces of malware had numerous commonalities, including similar achitectural platforms, module structures, code bases and communication methods with command and control servers. Flame, along with Stuxnet, is believed by many to have been part of a state-sponsored cyber-operation by the United States and Israel. 

According to Kaspersky Lab, miniFlame – called SPE in the code of Flame’s original C&C servers – is based on the same architectural platform as Flame and operates as a backdoor designed for data theft and direct access to infected computers. In addition, it is also capable of taking screenshots of victims’ computers while the computer is using a Web browser, Adobe Reader, Microsoft Office, an instant messenger or FTP client. 

The tool uploads the stolen data by connecting to its C&C server. An additional data-stealing module can be sent to an infected system to target USB devices and use them to store data collected from machines.

Development of miniFlame is believed to have started as early as 2007. Several versions of miniFlame were created between 2010 and 2011, with some still active in the wild today, according to the company.

The original infection vector of miniFlame has not been determined by Kaspersky Lab. However, unlike Flame or Gauss, which had high number of infections, the amount of infections for miniFlame is small – about 50-60 machines worldwide.

“miniFlame is a high precision attack tool,” said Alexander Gostev, chief security expert, Kaspersky Lab, in a statement. “Most likely it is a targeted cyberweapon used in what can be defined as the second wave of a cyberattack.”

“First, Flame or Gauss are used to infect as many victims as possible to collect large quantities of information,” he continued. “After data is collected and reviewed, a potentially interesting victim is defined and identified, and miniFlame is installed in order to conduct more in-depth surveillance and cyber-espionage. The discovery of miniFlame also gives us additional evidence of the cooperation between the creators of the most notable malicious programs used for cyber warfare operations: Stuxnet, Duqu, Flame and Gauss.”

 A detailed analysis of miniFlame can be found here.

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Expert Insights

Related Content


Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet


Iranian APT Moses Staff is leaking data stolen from Saudi Arabia government ministries under the recently created Abraham's Ax persona


Russia-linked cyberespionage group APT29 has been observed using embassy-themed lures and the GraphicalNeutrino malware in recent attacks.


WASHINGTON - Cyberattacks are the most serious threat facing the United States, even more so than terrorism, according to American defense experts. Almost half...


The UK’s NCSC has issued a security advisory to warn about spearphishing campaigns conducted by two unrelated Russian and Iranian hacker groups.


Artificial intelligence is competing in another endeavor once limited to humans — creating propaganda and disinformation.


Albanian prosecutors on Wednesday asked for the house arrest of five public employees they blame for not protecting the country from a cyberattack by...


While cyber eyes are trained on Russia, we should remember that it is not the West’s only cyber adversary. China, Iran, and North Korea...