Username: Save?
Password:
Home Forum Links Search Login Register*
    News: Welcome to the TechnoWorldInc! Community!
Recent Updates
[April 12, 2025, 01:54:20 PM]

[April 12, 2025, 01:54:20 PM]

[April 12, 2025, 01:54:20 PM]

[April 12, 2025, 01:54:20 PM]

[March 12, 2025, 03:05:30 PM]

[March 12, 2025, 03:05:30 PM]

[March 12, 2025, 03:05:30 PM]

[March 12, 2025, 03:05:30 PM]

[January 03, 2025, 03:29:12 PM]

[January 03, 2025, 03:29:12 PM]

[January 03, 2025, 03:29:12 PM]

[January 03, 2025, 03:29:12 PM]

[November 08, 2024, 04:31:03 PM]
Subscriptions
Get Latest Tech Updates For Free!
Resources
   Travelikers
   Funistan
   PrettyGalz
   Techlap
   FreeThemes
   Videsta
   Glamistan
   BachatMela
   GlamGalz
   Techzug
   Vidsage
   Funzug
   WorldHostInc
   Funfani
   FilmyMama
   Uploaded.Tech
   Netens
   Funotic
   FreeJobsInc
   FilesPark
Participate in the fastest growing Technical Encyclopedia! This website is 100% Free. Please register or login using the login box above if you have already registered. You will need to be logged in to reply, make new topics and to access all the areas. Registration is free! Click Here To Register.
+ Techno World Inc - The Best Technical Encyclopedia Online! » Forum » THE TECHNO CLUB [ TECHNOWORLDINC.COM ] » Techno News
 Kaspersky Lab Experts Provide In-Depth Analysis of Flame’s C&C Infrastructure
Pages: [1]   Go Down
  Print  
Author Topic: Kaspersky Lab Experts Provide In-Depth Analysis of Flame’s C&C Infrastructure  (Read 422 times)
RealWire
TWI Hero
**********



Karma: 0
Offline Offline

Posts: 18530


View Profile Email


UK, Abingdon, June 2012 - On May 28, 2012 Kaspersky Lab announced the discovery of a highly sophisticated malicious program, known as Flame, which was actively being used as a cyber-weapon targeting entities in several countries. Flame was discovered by Kaspersky Lab’s experts during an investigation prompted by the International Telecommunication Union (ITU), and the analysis of the malicious program revealed it was the largest and most complex attack toolkit to date.

Kaspersky Lab’s analysis of the malware revealed that it was currently being used for cyber-espionage and it would infect computers to steal data and sensitive information. The stolen data was then sent to one of Flame’s command & control (C&C) servers.

Kaspersky Lab has been closely monitoring Flame’s C&C infrastructure and published a detailed research post today about the findings.

In collaboration with GoDaddy and OpenDNS, Kaspersky Lab succeeded in sinkholing most of the malicious domains used by Flame’s C&C infrastructure. The following details summarise the results of the analysis:

•         The Flame C&C infrastructure, which had been operating for years, went offline immediately after Kaspersky Lab disclosed the discovery of the malware’s existence last week.
•         Currently there are more than 80 known domains used by Flame for C&C servers and its related domains, which have been registered between 2008 and 2012.
•         During the past 4 years, servers hosting the Flame C&C infrastructure moved between multiple locations, including Hong Kong, Turkey, Germany, Poland, Malaysia, Latvia, the United Kingdom and Switzerland.
•         The Flame C&C domains were registered with an impressive list of fake identities and with a variety of registrars, going back as far as 2008.
•         According to Kaspersky Lab’s sinkhole, infected users were registered in multiple regions including the Middle East, Europe, North America and Asia-Pacific.
•         The Flame attackers seem to have a high interest in PDF, Office and AutoCad drawings.
•         The data uploaded to the Flame C&C is encrypted using relatively simple algorithms. Stolen documents are compressed using open source Zlib and modified PPDM compression.
•         Windows 7 64 bit, which we previously recommended as a good solution against infections with other malware, seems to be effective against Flame.

Kaspersky Lab would like to thank William MacArthur and GoDaddy Network Abuse Department for their fast reaction and exceptional support of this investigation. In addition, Kaspersky Lab would also like to thank the OpenDNS Security Research Team, who also offered invaluable assistance during the course of this investigation.

During the past week, Kaspersky Lab contacted CERT’s in multiple countries to inform them about the Flame C&C domain information and IP addresses of the malicious servers. Kaspersky Lab would like to thank all who participated for their support of this investigation.

If you are a GovCERT institution and would like to receive more information about the C2 domains, please contact us at: “[email protected]

To read the full analysis of Flame’s C&C infrastructure and all its technical details, please visit: Securelist.

Logged

Pages: [1]   Go Up
  Print  
 
Jump to:  

Copyright © 2006-2023 TechnoWorldInc.com. All Rights Reserved. Privacy Policy | Disclaimer
Page created in 0.092 seconds with 23 queries.