The flame virus is used as an espionage technique, where computer
systems are sabotaged and vital data stolen. A famous data security
organization, Symantec Corp suspected that Iran was succumbed to this
viral attack in April. According to reliable sources, US and Israel
together developed Stuxnet, a virtual weapon sharing a similar code as
Flame and used it to slow Iran’s nuclear program. Flame is twenty times
more complex and bigger than Stuxnet, which makes it even more risky.
This virus can delete files leading to absolute failure of
mission-critical programs or disabling of operating systems. It can be
used to destroy vital infrastructure systems, like chemical and
manufacturing plants. The virus can have terrible impacts on industrial
control systems that can lead to malfunctioning of an entire nation.
There are few noteworthy source names for different module families in Flame’s source code, like:
a) Flame – Performs attack functions
b) Boost – Gathers information
c) Jimmy – Attack module type
d) Flask – Attack module type
e) Spotter – Snack modules
f) Euphoria – File leaking modules
g) Transporter – Replication modules
h) Headache – Attacks properties
The initial entry of the flame virus is vague – it can be by spearphishing or from infected websites. Later it spreads to systems connected by a LAN or via an USB drive. It can detect relevant information from passwords concealed with asterisk, take screenshots from IM programs, record vital content from verbal discussions over the microphone. Post data collection, all of it is uploaded on command servers that are distributed globally. This warfare virus is dangerous from the point of view of national security as it focuses on the masses and not on selective persons. Recently, The UN International Telecommunications Union has issued a warning to all countries to stay on high alert against attacks by this hazardous virus.
There are few noteworthy source names for different module families in Flame’s source code, like:
a) Flame – Performs attack functions
b) Boost – Gathers information
c) Jimmy – Attack module type
d) Flask – Attack module type
e) Spotter – Snack modules
f) Euphoria – File leaking modules
g) Transporter – Replication modules
h) Headache – Attacks properties
The initial entry of the flame virus is vague – it can be by spearphishing or from infected websites. Later it spreads to systems connected by a LAN or via an USB drive. It can detect relevant information from passwords concealed with asterisk, take screenshots from IM programs, record vital content from verbal discussions over the microphone. Post data collection, all of it is uploaded on command servers that are distributed globally. This warfare virus is dangerous from the point of view of national security as it focuses on the masses and not on selective persons. Recently, The UN International Telecommunications Union has issued a warning to all countries to stay on high alert against attacks by this hazardous virus.
No comments:
Post a Comment
If you have any suggestions or complaints please write us at techsspots@gmail.com
Thankyou
techs spots