Antivirus Protection & Internet Security Software
04 Jun 2012Virus News
On May 28, 2012 Kaspersky Lab announced the discovery of a highly sophisticated malicious program, known as Flame, which was actively being used as a cyber weapon targeting entities in several countries. Flame was discovered by Kaspersky Lab’s experts during an investigation prompted by the International Telecommunication Union (ITU), and the analysis of the malicious program revealed it was the largest and most complex attack toolkit to date.
Kaspersky Lab’s analysis of the malware revealed that it was currently being used for cyber-espionage and it would infect computers to steal data and sensitive information. The stolen data was then sent to one of Flame’s command & control (C&C) servers.
Kaspersky Lab has been closely monitoring Flame’s C&C infrastructure and published a detailed research post today about the findings.
In collaboration with GoDaddy and OpenDNS, Kaspersky Lab succeeded in sinkholing most of the malicious domains used by Flame’s C&C infrastructure. The following details summarize the results of the analysis:
Kaspersky Lab would like to thank William MacArthur and GoDaddy Network Abuse Department for their fast reaction and exceptional support of this investigation. In addition, Kaspersky Lab would also like to thank the OpenDNS Security Research Team, who also offered invaluable assistance during the course of this investigation.
During the past week, Kaspersky Lab contacted CERT’s in multiple countries to inform them about the Flame C&C domain information and IP addresses of the malicious servers. Kaspersky Lab would like to thank all who participated for their support of this investigation.
If you are a GovCERT institution and would like to receive more information about the C2 domains, please contact us at: email@example.com.
To read the full analysis of Flame’s C&C infrastructure and all its technical details, please visit: Securelist.
© 1997 – 2016 Kaspersky Lab
All Rights Reserved. Industry-leading Antivirus Software