Flame Malwares Ties To Stuxnet, Duqu: Details Emerge

  /     /     /  
Publicated : 22/11/2024   Category : security


Flame Malwares Ties To Stuxnet, Duqu: Details Emerge


All three pieces of malware seemingly commissioned by the same entity and developed on the same platform, but by different groups of developers, security researchers say.



Three of the most high-profile pieces of malware to have been discovered in the past two years have been Stuxnet, Duqu, and as of this week, Flame. Now, researchers are suggesting that whoever commissioned Stuxnet and Duqu also ordered up Flame.
We believe Flame was written by a different team of programmers but commissioned by the same larger entity, Roel Schouwenberg, a security researcher at Kaspersky Labs,
told

The New York Times
. But he declined to name the larger entity--or nation states--that he thought had commissioned Duqu.
If the three different malicious applications share a common origin, each appears to have been designed for a different purpose. Duqu, for example, was
cyber-espionage malware
created to act as a backdoor into the system and facilitate the theft of private information, said Kaspersky Lab security researcher Ryan Naraine in a
blog post
. The private information in question, according to Kaspersky Lab, included nuclear facility blueprints and industrial control system schematics. Duqu was first discovered in September 2011.
[ What do we know about Flame? See
Flame FAQ: 11 Facts About Complex Malware
. ]
According to Kaspersky Lab, Duqus developers appeared to keep to Jerusalem time, and notably didnt work on the Jewish Sabbath--occurring between Friday evening and Saturday evening--in which some Jews observe a day of rest,
The New York Times
reported Wednesday.
Meanwhile, Stuxnet--first discovered in June 2010--was designed to
sabotage the high-frequency convertor drives
used in a single uranium enrichment facility in Iran. Notably, the malware adjusted the speed of the drives to run at very high and low frequencies, while reporting normal behavior via the
industrial control system software
interface that ran the machines. The result was destroyed centrifuges and uranium that hadnt been enriched.
Kaspersky Lab researchers last year had already noted that Stuxnet and Duqu appeared to have been
developed by the same team
, on the same platform, which appears to have been used between 2007 and 2011. Furthermore, they suspected that additional malware--even if it hadnt yet been found--would have also been created using the platform. Timing-wise, according to AlienVault, Flame fits into that scenario, as at least one component in Flame was
first compiled in 2008
, while later modules date from 2009, 2010, and 2011.
While the Stuxnet malware was designed to spread automatically, the Duqu Trojan would only infect PCs when ordered to do so via its command-and-control channel. Likewise, the
Flame malware
--which may have infected just 1,000 PCs--only spread to designated PCs, which made it tough for security vendors to spot or stop. Flame has been operating under the radar for at least two years, which counter-intuitively may partially be attributed to its large size, according to a
blog post
from Websense.
Another similarity between the three pieces of malware is that while they might be complex, and all targeted known zero-day vulnerabilities--which can be
purchased on the black market
--they used coding capabilities that had been seen before. (Although in the case of Stuxnet, no one had ever seen such capabilities being used by malware to cause physical damage.) While it really doesnt do anything we havent seen before in other malware attacks, whats really interesting is that it weaves multiple techniques together and dynamically applies them, based on the capabilities of the infected system, according to Websense.
Researchers are continuing to study Flame to unravel how it works, and the task is made difficult by the malwares size. Notably, it starts out with an initial infection thats between 900 K and 6 MB in size, but which can grow to 20 MB after additional modules have been loaded onto a PC. This is a lot of code, and a lot of possibility, said Bob Reny, a systems engineer at network access control vendor ForeScout Technologies, via email.
The number of different components in W32.Flamer is difficult to grasp, according to an analysis from
Symantec
. The threat is a well-designed platform including, among other things, a Web server, a database server, and secure shell communications. It includes a scripting interpreter which allows the attackers to easily deploy updated functionality through various scripts. These scripts are split up into apps and the attackers even appear to have something equivalent to an app store from where they can retrieve new apps containing malicious functionality.
Another interesting new Flame finding suggests that its builders may have been native English speakers. According to an
analysis
from Alexander Gostev at Kaspersky Lab, units in various modules sport names such as Beetlejuice (discovers nearby Bluetooth devices), Microbe (records audio), Infectmedia (infects USB drives), Euphoria (launches Flame), Limbo (creates backdoor on system), Frog (infects predefined accounts on machine), Weasel (lists the computers directory), Gator (connects to C&C server), and Suicide (removes all files connected to Flame). Meanwhile, the purpose of other discovered units in modules, sporting with names such as Bunny, Driller, Headache, and Gadget, has yet to be determined.
Security information and event monitoring technology has been available for years, but the information can be hard to mine. In our
SIEM Success
report, we provide a step-by-step guide to make the most of your SIEM system. (Free registration required.)

Last News

▸ Hack Your Hotel Room ◂
Discovered: 23/12/2024
Category: security

▸ Website hacks happened during World Cup final. ◂
Discovered: 23/12/2024
Category: security

▸ Criminal Possession of Government-Grade Stealth Malware ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Flame Malwares Ties To Stuxnet, Duqu: Details Emerge