Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

New Version of Flame Malware Platform Discovered

The Flame platform was believed dead following public exposure in 2012, but recently discovered evidence suggests that it remained alive, albeit very well hidden, security researchers at Alphabet-owned Chronicle reveal.

The Flame platform was believed dead following public exposure in 2012, but recently discovered evidence suggests that it remained alive, albeit very well hidden, security researchers at Alphabet-owned Chronicle reveal.

Connected to Stuxnet and Duqu through the activity cluster tracked by Chronicle as GossipGirl Supra Threat Actor (STA), Flame was first detailed in May 2012, following attacks on several countries, mainly Iran and Israel. The Flame backdoor was found to include worm-like capabilities and is said to have been in use since 2009.

The same as Duqu and Stuxnet, Flame has a modular design, providing attackers with the ability to gather system information, beacon to nearby Bluetooth devices, implement network replication, propagate to other machines or removable media, create backdoor accounts, and more.

Following public exposure, the attackers attempted a cleanup by distributing a “suicide” module to remaining infections. This was, as experts described it, “a particularly clunky way of burning down operations as it gave researchers a full list of the components and directories that the operators sought to delete,” but suggested that Flame was gone.

The investigation into GossipGirl, however, led to the discovery of Flame samples that were compiled after 2012, with some builds likely created in February-March 2014, two years after the initial cyberespionage operation was burned down, Chronicle reveals in a report shared with SecurityWeek.

The researchers believe these samples, which were built on the Flame source code and packed new counter-measures against researcher meddling, were used in operations in the 2014-2016 timeframe.

The Flame 2.0 platform employs multiple modules controlled by an orchestrator reliant on an embedded Lua VM. The modules are AES-256-encrypted, with the key passed to the orchestrator upon execution in the form of an argument to the various DLL exports.

The experts were unable to decode the embedded modules, which prevented them from determining the full functionality of the attack toolkit, but said it was likely designed to support lateral movement, create files, and check for anti-virus programs, among others. Overall, however, the Flame 2.0 platform remains largely a mystery.

Advertisement. Scroll to continue reading.

During their analysis of the GossipGirl STA, Chronicle researchers also discovered a new Stuxnet module suggesting that a fourth team was involved in the malware’s development, and Duqu 1.5, which demonstrated that the threat actor behind the malware remained active after its exposure in 2011.

GossipGirl Supra Threat Actor (STA)

Related: New Module Suggests Fourth Team Involved in Stuxnet Development

Related: Duqu Remained Active After Operations Were Exposed in 2011

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Cyberwarfare

WASHINGTON - Cyberattacks are the most serious threat facing the United States, even more so than terrorism, according to American defense experts. Almost half...

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Cyberwarfare

Russian espionage group Nomadic Octopus infiltrated a Tajikistani telecoms provider to spy on 18 entities, including government officials and public service infrastructures.