How Flame Hid In Plain Sight For Years

  /     /     /  
Publicated : 22/11/2024   Category : security


How Flame Hid In Plain Sight For Years


Easy-to-crack encryption likely helped keep Flame alive, as well as its resemblance to conventional software



One of the most striking aspects about the newly discovered Flame malware kit is its ordinary appearance -- which is what helped make it so elusive for years.
As security researchers dig deeper into the massive lines of code that make up
this targeted attack threat discovered this month
, the fact that this dangerous cyberespionage kit evaded security controls for so long demonstrates how its similar structure to a commercial software program and its use of off-the-shelf techniques, such as SSL, SSH, and a SQL database, helped it blend in with other application traffic.
Flame has been around for a minimum of two-plus years, and up to eight years, according to some new analysis. It was highly targeted, infecting no more than 1,000 users,
mostly in Iran
, but also a few infections in other parts of the Middle East, Africa, and Hungary. And its basically a virtual, digitized spy tool that does what a human spy would do: recording phone calls, snapping photos, and siphoning information.
Given that the majority of its targets were computers in Iran, where pirated software is rampant, it was likely easy for the attacks to bypass security controls, if there were any at all, experts say. It was probably put on systems that dont have antivirus or was bypassing AV in a direct attack, says Stephen Cobb, security evangelist for ESET. Flame looks a lot like a normal software program, with standard libraries and unremarkable traffic. Actions such as turning on the computers microphone for recording voice calls and meetings wouldnt necessarily raise suspicion, for instance, security experts say.
Lance James, director of intelligence at Vigilant, considers Flame the most complicated piece of malware ever written. But features such as Flames encryption are simplified in order to remain under the radar, he says. My theory is that they were not designed to be unbreakable encryption, James says. Flame contains five encryption ciphers, most of which are easily cracked, he adds.
Thats not typical of malware. Most sophisticated malware employs stronger encryption, but the trade-off for the attacker is that its traffic can trigger a red flag at the network layer. Entropy and complexity is used by most [malware developers], James says. In the world of encryption detection of malware at the network layer ... you watch the traffic generated by it and if the measure of randomness/entropy is high, that could be a sign of malware with crypto, he says.
Flames creators either used easily cracked encryption to camouflage the attack, or it could be a function of the size of the overall code, he says. They didnt want you to detect that they were hiding anything. They wanted to look like common data, James says. It did the opposite of what everyone is expecting with malware. And thats what helped it stay undetected for so long.
Then theres the issue of trade sanctions against Iran. The U.S. and other nations are banned from selling certain technology to Iran, including antivirus software. So if users there pirated versions, they arent likely getting security updates, experts say.
These regions tend to perform more poorly than the average on an AV solution deployment, says Gunter Ollmann, vice president of research at Damballa. Im sure one of the criteria [in an attack] was whether or not there were security products on the targeted device and if its capable of detecting [Flames] bag of tricks.
But what worries security experts most is what the next version of Flame will do. Now that the cats out of the bag, its developers could create new versions, and copycats could emerge. Its a framework. I wouldnt be surprised to see it going around again, James says. Its designed like a software house would do.
Francis Cianfrocca, founder and CEO of Bayshore Networks, says there are possibly dozens of precursors and descendants of Flame at large that havent been detected because they havent triggered any alarms. And its a platform that could be used for any type of targeted advanced persistent threat (APT)-type attack, which should worry businesses in the U.S., too.
[ With conventional wisdom now that advanced attacks happen, has the time come to create the next-generation sandbox or other containment method? See
Advanced Attacks Call For New Defenses
. ]
With an APT, the value of having a platform like Flame is that it appears to be a platform. It looks to have the novel ability of controlling the I/O on an endpoint by taking over Bluetooth and other features, Cianfrocca says. Its the perfect thing if you want to eavesdrop on someone directly.
Whats more worrisome is the ability of another version of Flame that could launch attacks within a corporation, he says. This is a platform constructed in a sophisticated way to allow more than one kind of attack, he says.
Have a comment on this story? Please click Add Your Comment below. If youd like to contact
Dark Readings
editors directly,
send us a message
.

Last News

▸ Scan suggests Heartbleed patches may not have been successful. ◂
Discovered: 23/12/2024
Category: security

▸ IoT Devices on Average Have 25 Vulnerabilities ◂
Discovered: 23/12/2024
Category: security

▸ DHS-funded SWAMP scans code for bugs. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
How Flame Hid In Plain Sight For Years