查看: 5596|回复: 20
收起左侧

[讨论] 【非正规解读】‘火焰病毒’Flame (malware)事件

  [复制链接]
【乱】
发表于 2012-6-1 02:24:33 | 显示全部楼层 |阅读模式
本帖最后由 【乱】 于 2012-6-1 04:12 编辑

起先我也不是内部什么牛人,引用了下外国的维基看了下相关资料(2楼),显然其实说卡巴拦截到了一个国家级病毒,这种理解是错误的
Its discovery was announced on 28 May 2012 by MAHER Center of Iranian National Computer Emergency Response Team (CERT)

谷歌翻译:马赫伊朗国家计算机应急反应小组(CERT)在5月28号宣布了它(火焰)的发现
而卡巴只是做了一个媒体~
卡巴斯基实验室和CrySyS实验室。布达佩斯技术大学和经济学在其报告中指出,这些过去。“sKyWIper肯定是我们在实践中遇到的最复杂的恶意软件;可以说,它是迄今发现的最复杂的恶意软件


而根据卡巴的报告只有1000台电脑被感染,显然在这里我们可以试想 基本一个流行木马 都可以感染上千万台电脑;然而这么一个牛X的病毒却只有感染1000?显然是有针对性和小规模的谋策投放;是否因为这个原因火焰持续了将近2年都没被杀软发现 其原因因为它基本没跟杀软接触 而是感染一些‘国家机密电脑’
ccording to estimates by Kaspersky, Flame has infected approximately 1,000 machines,with victims including governmental organizations, educational institutions and private individuals. As of May 2012, the countries most affected are Iran, Israel, Sudan, Syria, Lebanon, Saudi Arabia, and Egypt.

再之后,该文件大小是20MB,用迅雷旋风等下载一个20MB的软件 估计起码要2-3分钟;像一些国家 校园等我估计不支持联网吧?你让他给你网页传播...开个网页在那同个网页呆20分钟吧.....
USB?看电影里间谍 留着汗把USB插进电脑 然后备注数据的片段
然后这病毒行为很多;那么意味着 诸多的行为也能成为败笔 面对杀软的防护监控难免会碰壁而且现在防火墙能力的杀毒软件也不是那么容易过的;再加上庞大的数据搜集 如果覆盖率多了就造成信息统计问题;而且那么一台电脑的数据都上传我不知道要潜在在电脑里几个月才能无声无吸的把数据全部上传完;
在之后可以证实
1-任何杀软没有发现该病毒
2-现在大多杀软正在跟进

然后上述样本的复杂性 所以使用者想对P民进攻也会非常的复杂.....

国内外杀软至今没人一家正式发布发现该病毒 以及完美拦截;就BD 和金山方面 放出了个专杀或检测器http://www.bit361.com/NewsRead.aspx?id=543
http://bbs.duba.net/thread-22714225-1-1.html

金山方面:
因该样本的来源不是实际感染渠道(图中样本广度为0),因而该样本未被关注。

而且样本鉴定为‘灰’

其实整个文章也就火眼比较给力


所以今后大伙压根不需要口水任何杀软关于‘火焰’病毒的查杀能力 ;各家公告只是传播资讯+炒作
【乱】
 楼主| 发表于 2012-6-1 02:28:19 | 显示全部楼层
本帖最后由 【乱】 于 2012-6-1 02:29 编辑

http://en.wikipedia.org/wiki/Flame_%28malware%29
如果英文差建议用下谷歌翻译
http://translate.google.com/?hl=zh-CN&tab=wT
=================================

Flame,[a] also known as Flamer, sKyWIper, and Skywiper,[2] is modular computer malware discovered in 2012[3][4] that attacks computers running the Microsoft Windows operating system.[5] The program is being used for targeted cyber espionage in Middle Eastern countries.[1][5][6] Its discovery was announced on 28 May 2012 by MAHER Center of Iranian National Computer Emergency Response Team (CERT),[5] Kaspersky Lab[6] and CrySyS Lab. of the Budapest University of Technology and Economics.[1] The last of these stated in its report that "sKyWIper is certainly the most sophisticated malware we encountered during our practice; arguably, it is the most complex malware ever found."[1]

Flame can spread to other systems over a local network (LAN) or via USB stick. It can record audio, screenshots, keyboard activity and network traffic.[6] The program also records Skype conversations and can turn infected computers into Bluetooth beacons which attempt to download contact information from nearby Bluetooth-enabled devices.[7] These data, along with locally stored documents, are sent on to one of several command and control servers that are scattered around the world. The program then awaits further instructions from these servers.[6]

According to estimates by Kaspersky in May 2012, Flame had infected approximately 1,000 machines,[7] with victims including governmental organizations, educational institutions and private individuals.[6] At that time the countries most affected were Iran, Israel, Sudan, Syria, Lebanon, Saudi Arabia, and Egypt.[3][6]

Flame is known to have been "in the wild" since February 2010, so it had evaded detection by security software for just over two years when it was discovered[8]; the main component file name had been observed by December 2007. Flame might have remained undetected for much longer, but researchers came across it while investigating the "Wiper" exploit[8].

Stephen Wolthusen of the information security group at Royal Holloway, University of London said that the attack would percolate down beyond the immediate targets[8]; businesses could not dismiss Flame as about nation states and nothing to do with them.
Contents



History

Flame was identified in May 2012 by Kaspersky Lab, MAHER Center of Iranian National CERT, and CrySyS Lab (Laboratory of Cryptography and System Security) of the Budapest University of Technology and Economics when Kaspersky Lab was asked by the United Nations International Telecommunication Union to investigate reports of a virus affecting Iranian Oil Ministry computers.[7] As Kaspersky Lab investigated, they discovered an MD5 hash and filename that appeared only on customer machines from Middle Eastern nations. After discovering more pieces, researchers dubbed the program "Flame" after the name of one of its modules.[7]

According to Kaspersky, Flame has been operating in the wild since at least February 2010.[6] CrySyS reports that the file name of the main component had been observed as early as December 2007.[1] However, its creation date cannot be determined directly, as the creation dates for the malware's modules are falsely set to dates as early as 1994.[7]

Computer experts consider it the cause of an attack in April 2012 that caused Iranian officials to disconnect their oil terminals from the Internet.[9] At the time the Iranian Students News Agency referred to the malware that caused the attack as "Wiper", a name given to it by the malware's creator.[10] However, Kaspersky Lab believes that Flame may be "a separate infection entirely" from the Wiper malware.[7] Due to the size and complexity of the program—described as "twenty times" more complicated than Stuxnet—the Lab stated that a full analysis could require as long as ten years.[7]

On 28 May, Iran's CERT announced that it had developed a detection program and a removal tool for Flame, and had been distributing these to "select organizations" for several weeks.[7]
Specifications

The malware is an uncharacteristically large program for malware at 20 megabytes, written partly in the Lua scripting language with compiled C++ code linked in, and allows other attack modules to be loaded after initial infection.[6][11] The malware uses five different encryption methods and an SQLite database to store structured information.[1] The method used to inject code into various processes is stealthy, in that the malware modules do not appear in a listing of the modules loaded into a process and malware memory pages are protected with READ, WRITE and EXECUTE permissions that make them inaccessible by user-mode applications.[1] The internal code has few similarities with other malware, but exploits two of the same security vulnerabilties used previously by Stuxnet to infect systems.[1] The malware determines what antivirus software is installed, then customises its own behaviour (for example, by changing the filename extensions it uses) to reduce the probability of detection by that software.[1] Additional indicators of compromise include mutex and registry activity, such as installation of a fake audio driver which the malware uses to maintain persistence on the compromised system.[11]
Usage

Like the previously known cyber weapons Stuxnet and Duqu, it is employed in a targeted manner and can evade current security software through rootkit functionality. Once a system is infected, Flame can spread to other systems over a local network or via USB stick. It can record audio, screenshots, keyboard activity and network traffic.[6] The program also records Skype conversations and can turn infected computers into Bluetooth beacons which attempt to download contact information from nearby Bluetooth enabled devices.[7] This data, along with locally stored documents, is sent on to one of several command and control servers that are scattered around the world. The program then awaits further instructions from these servers.[6]

Unlike Stuxnet, which was designed to damage an industrial process, Flame appears to have been written purely for espionage purposes.[12] It does not appear to target a particular industry, but rather is "a complete attack toolkit designed for general cyber-espionage purposes".[13]

Flame contains no built-in end-of-life date when it will deactivate, but allows operators to send a "kill" module that eliminates all traces of its files from a system.[7]
Speculation about origin

According to Kaspersky's chief malware expert, "the geography of the targets and also the complexity of the threat leaves no doubt about it being a nation-state that sponsored the research that went into it."[3] Kaspersky has said that the malware bears no resemblance to Stuxnet, but it may have been a parallel project commissioned by the same attackers.[14]

Iran's CERT described the malware's encryption as having "a special pattern which you only see coming from Israel".[15] The Daily Telegraph reported that due to Flame's apparent targets—which included Iran, Syria, and the West Bank—Israel became "many commentators' prime suspect". Other commentators named China and the U.S. as possible perpetrators.[14] Richard Silverstein, a commentator critical of Israeli policies, stated that he had confirmed with a "senior Israeli source" that the malware was created by Israeli computer experts.[16][14] The Jerusalem Post wrote that Israel's Vice Prime Minister Moshe Ya'alon appeared to have hinted that his government was responsible,[14] but an Israeli spokesperson later denied that this had been implied.[17] Israeli security officials pointed to the machines infected in Israel as evidence that the U.S. was behind the malware.[18]

A network of 80 servers across Asia, Europe and North America have been used to access the infected machines remotely.[19]
wjcharles
发表于 2012-6-1 03:48:57 | 显示全部楼层
本帖最后由 wjcharles 于 2012-6-1 03:50 编辑

瑞星说在4月份发现并杀了
http://www.rising.com.cn/about/news/rising/2012-05-30/11617.html

卡饭上发的两个样本NIS在一年前就已经发现,文件信誉为不良,但没有入库
http://bbs.kafan.cn/forum.php?mo ... &fromuid=489037

金山LZ已经提到了
http://bbs.duba.net/thread-22713852-1-1.html

卡巴好像也说很早(2010)就发现了

所以不能说没有任何杀软发现,只是可能发现得不够完整,单个文件不容易判黑白
【乱】
 楼主| 发表于 2012-6-1 04:16:21 | 显示全部楼层
wjcharles 发表于 2012-6-1 03:48
瑞星说在4月份发现并杀了
http://www.rising.com.cn/about/news/rising/2012-05-30/11617.html

主楼刚好修改了字眼问题
卡巴说的是该病毒从2010放出而没被杀软察觉
像金山云中心一样 有这东西的踪迹 但没有对其定义

然后目前各杀软也在跟进
网上也传出了样本  真假不知道 就像样本区就已经有了不过只有600K的大小
-oAo-
发表于 2012-6-1 08:04:47 | 显示全部楼层
杀软在炒作做宣传,正常
lovehhy
发表于 2012-6-1 08:13:18 | 显示全部楼层
其实就是一个属于团队开发的木马而已,比以往个人开发的要强一点。国产软件的一堆后门,哪个不比火焰强?而且都是上百人的团队来开发的。在这些全包围中,哪个屁民还有啥隐私?你装安全软件,会给你装播放软件,你装播放软件,会给你工具条,你装工具条,它又给你装输入法,你装输入法,它又给你浏览器。总之哪个都比火焰牛!

卡巴是没有见过天朝的世面,所以就大惊小怪了。
心鉴
发表于 2012-6-1 08:50:40 | 显示全部楼层
这个病毒估计是针对广大网民全普及20M以上光纤研发的
老机子
发表于 2012-6-1 11:12:30 | 显示全部楼层
心鉴 发表于 2012-6-1 08:50
这个病毒估计是针对广大网民全普及20M以上光纤研发的

就是就是,我们这的2MB ADSL能中上他就如买彩票中100万一样!——与其说那是个病毒,倒不如说他是个“系统”任何一个配件失败或不完整!他就是个聋子瞎子,傻子!好像说接近10MB!——我勒个去!
simon92
发表于 2012-6-1 11:37:21 | 显示全部楼层
-oAo- 发表于 2012-6-1 08:04
杀软在炒作做宣传,正常

同意
-oAo-
发表于 2012-6-1 11:57:40 | 显示全部楼层
simon92 发表于 2012-6-1 11:37
同意

王婆卖瓜嘛
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2025-1-19 11:23 , Processed in 0.126424 second(s), 16 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表