Report: Flame part of US-Israeli cyberattack campaign against Iran
Unnamed Western officials confirmed that Flame was developed by US and Israeli governments, the Washington Post reported
IDG News Service - The highly sophisticated Flame malware was jointly developed by the U.S. and Israeli governments in preparation for a cybersabotage campaign to disrupt Iran's nuclear fuel enrichment efforts, according to a media report.
Citing unnamed Western officials with knowledge of the operation, the Washington Post reported Tuesday that Flame's goal was to collect intelligence about Iran's computer networks that would facilitate future cyberattacks.
On June 1, The New York Times reported that Stuxnet, a sophisticated piece of malware that is believed to have caused the destruction of up to 1,000 gas centrifuges at Iran's Natanz uranium enrichment facility, was created by the U.S. and Israel governments as part of a joint operation code-named Olympic Games.
The Times cited unnamed official sources who said that prior to deploying Stuxnet, cyberespionage software programs known as beacons were secretly inserted into computers made by German hardware manufacturer Siemens and an Iranian company.
The purpose of these beacons was to collect information about how computer from the Natanz facility interoperated with the uranium enrichment centrifuges, and send this data back for analysis.
On June 11, security researchers from Kaspersky Lab, one of the security companies that discovered and analyzed the Flame malware, announced that they found a link between Flame and Stuxnet in the form of shared computer code.
Based on this evidence of collaboration, they theorized that the two threats were created by two development teams funded by the same group of attackers. Flame was probably used for espionage and Stuxnet for sabotage, Roel Schouwenberg, a senior researcher with Kaspersky Lab's global research and analysis team, said at the time.
Flame was discovered back in May, following an investigation into a series of mysterious data loss incidents at Iran's Oil Ministry. Those attacks were carried out in April by the Israeli part of the operation without knowledge from the U.S. side, the Washington Post's sources said.
Security researchers from Kaspersky Lab believe that Flame was created in the first half of 2008. Stuxnet was discovered in June 2010, but the first variant of the malware is believed to date from June 2009.
In September 2011, a separate piece of cyberespionage malware called Duqu was discovered. Duqu's architecture and code are similar to Stuxnet, leading security researchers to believe that the two threats were created on the same development platform.
- DOJ's charges against China reframe security, surveillance debate
- Hacker indictments against China's military unlikely to change anything
- U.S. to formally accuse Chinese military of hacking
- Cyberattacks could paralyze U.S., former defense chief warns
- The NSA blame game: Singling out RSA diverts attention from others
- Jury still out on FISA court
- Suspected China-based hackers 'Comment Crew' rises again
- Chinese hackers master the art of lying in wait
- Spy court OK'd all U.S. wiretap requests it received in 2012
- Groups denounce FBI plan to require Internet backdoors for wiretaps
- Troubleshooting Common Issues in VoIP Learn more about Voice over Internet Protocol (VoIP), including common VoIP metrics used, best practices in VoIP management and tips and tricks for...
- 2013 Network Management Software (NMS) Buyers Guide This white paper contains an independent comparison study of six different network management solutions and provides guidance on how you can choose the...
- Rightsizing Your Network Performance Management Solution: 4 Case Studies This white paper discusses challenges encountered as organizations search for the most cost-effective network performance management solution.
- Global Growing Pains: Tapping into B2B Integration Services to Overcome Global Expansion Challenges A recent survey by IDG Research explored both the challenges and pain points companies face when growing globally, as well as the capabilities...
- E-Signature RFP Checklist Webcast If your organization is looking to adopt e-signatures, you may be overwhelmed by the number of providers that offer seemingly similar solutions. How...
- Cloud and Collaboration: Driving Your Business Value Mission Critical Cloud from Peer 1 Hosting is enterprise-grade. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!