Providing Free and Editor Tested Software Downloads
< HOME | TUTORIALS | GEEK-CADE| WEB TOOLS | YOUTUBE | NEWSLETTER | DEALS! | FORUMS | >

MajorGeeks.com - The Anti-Social Social Site since 2002

Software Categories

All In One Tweaks
Android
Antivirus & Malware
Appearance
Back Up
Browsers
CD\DVD\Blu-Ray
Covert Ops
Drivers
Drives (SSD, HDD, USB)
Games
Graphics & Photos
Internet Tools
Linux Distros
MajorGeeks Windows Tweaks
Multimedia
Networking
Office & Productivity
System Tools

Other news

· How To and Tutorials
· Life Hacks and Reviews
· Way Off Base
· MajorGeeks Deals
· News
· Off Base
· Reviews



IObit Black Friday Sale

spread the word

· YouTube
· Facebook
· Instagram
· Twitter
· Pintrest
· RSS/XML Feeds
· News Blur
· Yahoo
· Symbaloo

about

· Top Freeware Picks
· Malware Removal
· Geektionary
· Useful Links
· About Us
· Copyright
· Privacy
· Terms of Service
· How to Uninstall

top downloads

1. GS Auto Clicker
2. Macrium Reflect FREE Edition
3. Smart Defrag
4. MusicBee
5. Sergei Strelec's WinPE
6. Microsoft Visual C++ 2015-2022 Redistributable Package
7. Visual C++ Redistributable Runtimes AIO Repack
8. McAfee Removal Tool (MCPR)
9. K-Lite Mega Codec Pack
10. Visual C++ Runtime Installer (All-In-One)
More >>

top reads

Star AI Answers: Authority Without Accountability

Star All the New Features Landing in Windows 11 This December

Star Lossless vs Lossy: When FLAC, APE, and ALAC Beat MP3 and When They Don't

Star Google Search Tricks You'll Actually Use in 2025 and Beyond

Star Fresh PC Checklist: First 12 Things to Do On a New Windows 11 Machine

Star Running AI Models Locally: What They Are, Where to Find Them, and How to Get Started

Star Deciding Between Idle State, Sleep Mode, and Shutdown: What's Best for Your PC?

Star How to Fix VMware Workstation "The Update Server Could Not Be Resolved" Error Installing VMware Tools

Star How to Remove Google Gemini from Your Phone (and Your Life)

Star Windows Bloat Removal Guide: Debloat Safely and Keep What You Need


MajorGeeks.Com » News » November 2012 » More Flame Modules Could Be Lurking

More Flame Modules Could Be Lurking


Contributed by: Email on 11/16/2012 04:17 PM [ comments Comments ]


After years of research and investigation into the cyber-espionage attacks that began with the discovery of Stuxnet and continued with Flame, Duqu and Gauss, there still are many details that are unknown. While researchers have a pretty good handle on many of the tools' capabilities, experts say that there may be other modules from these weapons still in circulation that have yet to be discovered.

Researchers believe that many of these recent attacks are connected, whether through code re-use, similar targets or other factors, and think that several of them may have been the work of the same team, or at least related groups. Each of the tools seemed to have a different purpose, with Stuxnet targeting a uranium-enrichment facility in Iran, for example, and Gauss being used to monitor financial transactions in specific banks.

And while much has been learned about the attackers' methods and their target base, researchers say that there may well be pieces of the attack tools that are yet unknown and are still in operation right now.

"There could be a Flame module deployed years ago with the same functionality as Stuxnet," Roel Schouwenberg, senior security researcher at Kaspersky Lab, said in a talk at the Cyber Security for the Next Generation conference at NYU-Poly here Friday. "We may never know."

Flame targeted some oil facilities in the Middle East and researchers found some direct links between its code and that of Stuxnet. They also later found commonalities between Flame and Gauss, drawing a straight line from Stuxnet down through Gauss and later tools.

Researchers so far have been able to get a handle on the way these attacks work and prepare defenses for them, but that may not always be the case, Schouwenberg said. The thing that worries him and other researchers is the emergence of an attack using novel techniques for which there are no clear protections.

"Right now I can still sleep at night. But what worries me is when we find an attack that can get by all of the defenses and we can't find protection for," he said.

The attackers behind Stuxnet and its descendants have shown remarkable versatility and flexibility in their development methods and have demonstrated that they can develop specific tools for highly specialized targets and succeed in compromising those systems. What comes next is unknown, of course, but there's no reason to think there aren't additional attacks ongoing at the moment that could eventually stump researchers.






« Florida Friday: Orlando gun range allows customers to shoot at each other · More Flame Modules Could Be Lurking · American Chopper reality show to end after 10 years: Paul Jr wants his own show »




Comments
comments powered by Disqus

MajorGeeks.Com » News » November 2012 » More Flame Modules Could Be Lurking

© 2000-2025 MajorGeeks.com
Powered by Contentteller® Business Edition