Full analysis of Flame's command & control servers

From Botnets.fr
Jump to navigation Jump to search

(Publication) Google search: [1]

Full analysis of Flame's command & control servers
Flame-kaspersky-timeline.jpg
Botnet Flame
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2012 / 17 septembre 2012
Editor/Conference Kaspersky lab
Link https://www.securelist.com/en/blog/750/Full Analysis of Flame s Command Control servers (Archive copy)
Author GReAT
Type

Abstract

Our previous analysis of the Flame malware, the advanced cyber-espionage tool that's linked to the Stuxnet operation, was initially published at the end of May 2012 and revealed a large scale campaign targeting several countries in the Middle East.

The Flame malware, including all of its components, was very large and our ongoing investigation revealed more and more details since that time. The news about this threat peaked on 4th June 2012, when Microsoft released an out-of-band patch to block three fraudulent digital certificates used by Flame. On the same day, we confirmed the existence of this in Flame and published our technical analysis of this sophisticated attack. This new side of Flame was so advanced that only the world's top cryptographers could be able to implement it. Since then, skeptical jokes about Flame have disappeared.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1170,
   editor = {Kaspersky lab},
   author = {GReAT},
   title = {Full analysis of Flame's command & control servers},
   date = {Error: Invalid time.},
   month = Error: Invalid time.,
   year = {2012},
   howpublished = {\url{https://www.securelist.com/en/blog/750/Full_Analysis_of_Flame_s_Command_Control_servers}},
 }