Iran General NewsMystery virus sought 'designs from Iran'

Mystery virus sought ‘designs from Iran’

-

AFP: A mystery computer virus discovered last month and deployed in a massive cyberattack chiefly against Iran sought to steal designs and PDF files from its victims, a Russian firm said.
MOSCOW (AFP) — A mystery computer virus discovered last month and deployed in a massive cyberattack chiefly against Iran sought to steal designs and PDF files from its victims, a Russian firm said.

Kaspersky Lab, one of the world’s biggest producers of anti-virus software, announced last month the discovery of the Flame virus, which it described as the biggest and most sophisticated malware ever seen.

In the latest update on Kaspersky’s analysis of the virus, released late Monday, the firm’s chief security expert, Alexander Gostev, said the malware’s creators had focussed on file formats such as PDF and AutoCAD, a software for computer design and drawing.

“The attackers seem to have a high interest in AutoCAD drawings,” Gostev said in a statement.

The malware also “goes through PDF and text files and other documents and makes short text summaries,” he added.

“It also hunts for e-mails and many different kinds of other ‘interesting’ (high-value) files that are specified in the malware configuration.”

He confirmed that Iran was by far the biggest target with a count of 185 infections, followed by 95 in Israel and the Palestinian Territories, 32 in Sudan and 29 in Syria.

The discovery of Flame immediately sparked speculation that it had been created by US and Israeli security services to steal information about Iran’s controversial nuclear drive.

Intriguingly, Kaspersky said that hours after the existence of the virus was first announced on May 28, “The Flame command-and-control infrastructure, which had been operating for years, went dark.”

It gave no further information over the possible perpetrators of the mystery attack, though it identified about 80 domains that appear to belong to the Flame infrastructure, in locations from Hong Kong to Switzerland.

Kaspersky said it had used a procedure known as sinkholing — which allows Internet security experts to gain control of a malicious server — to analyse the operation.

During the sinkholing it found that on three computers in Lebanon, Iraq and Iran the Flame versions changed, suggesting Flame upgraded itself in the process.

The New York Times reported last week that President Barack Obama has accelerated cyberattacks on Iran’s nuclear programme in an operation codenamed “Olympic Games” that uses a malicious code developed with Israel.

Latest news

U.S.–Iranian Regime Talks in Uncertainty

On the second day of the ceasefire between the United States and Iran's regime, with continued transit restrictions in...

The Execution Machine of Iran’s Regime Runs Without Pause

Less than three weeks after the start of U.S. and Israeli attacks on Iran, a wave of executions of...

Political Prisoner Maryam Akbari Monfared Released from Prison After 17 Years

Maryam Akbari Monfared, a political prisoner, was released after serving 17 years in prison, even though under the Iranian...

Iran War Tensions Escalate as US Deadline Approaches

Donald Trump has once again warned Iran’s regime and called for a resolution to the conflict. He said he...

The Head of the Iranian Regime’s Judiciary Called for Accelerating and Increasing Death Sentences

On Tuesday, April 7, Gholamhossein Mohseni Ejei, the head of the Iranian regime’s judiciary, called for accelerating and increasing...

Iranian Regime Rejects U.S. Ceasefire Proposal, Major Attack on Asaluyeh Petrochemical Facilities

On Monday, the official IRNA news agency reported that Iran had conveyed its position on the ceasefire proposal to...

Must read

The Iran regime’s real demand was PMOI/MEK annihilation

London, 12 Sep - The National Council of Resistance of...

Iran says will block attempts to reduce global oil prices

Iran Focus: Tehran, Iran, Jun. 23 - Iran’s caretaker...

You might also likeRELATED
Recommended to you