The Flame malware, a sophisticated threat that appears to have targeted Iran and other Middle Eastern nations, is at least four years old, according to new research published on 4 June.
After collaborating for a week on an analysis of Flame’s infrastructure, Russian security firm Kaspersky Labs and domain-name service provider OpenDNS reported that they had discovered at least 85 domains registered over the last four years that were used to host the command-and-control servers associated with Flame. The first three domains were registered on 2 March, 2008, according to OpenDNS.
Most of the domains start with a string of characters that appear innocuous, such as banner, flash, dns or server. By constructing the names with common words, the attackers tried to make it less likely that communications between infected machines and the command-and-control servers would be blocked, Dan Hubbard, vice president of research for OpenDNS, said during a press conference on 4 June.
“It was very well-planned and very well-executed, so it is a very sophisticated attack from that perspective,” said Hubbard.
Signs of infections were also found in European countries and the United States, but security experts that have analysed the program believe it did not necessarily target those nations.
Hours after the security firms published their initial research, the Flame command-and-control infrastructure was pulled offline, ostensibly by its operators, Roel Schouwenberg, senior researcher with Kaspersky Labs, told reporters. The company used sinkhole servers, which captured communications meant for Flame’s command-and-control infrastructure, to tap into the network of infected computers.
In the latest analysis, OpenDNS and Kaspersky Labs found that some 20 domain registries were used to register the more than seven dozen domains. In addition, while the domains constituted the main command-and-control channel used by Flame’s operators, another communications channel between compromised systems may exist, such as a peer-to-peer network, Schouwenberg said.
“We noticed that some victims are connecting with newer-version information over the past week,” said Schouwenberg. “So even though the command-and-control infrastructure was down, the victims’ machines were somehow updated.”
The analysis of domain registration activity, performed in conjunction with domain registry GoDaddy, underscored the differences between Flame and two previous attacks, Stuxnet and Duqu.
The command-and-control servers used by the Flame operators all ran Ubuntu Linux, while Stuxnet and Duqu both used CentOS for their operations. The Duqu operators were “super-stealthy” in hiding the Internet addresses of the actual computers serving up malware and commands, while the Flame operators ran their control scripts from the servers at each domain.
“From this point of view, we can state that the Duqu attackers were a lot more careful about hiding their activities compared to the Flame operators,” wrote Aleks Gostev, a senior lab expert with Kaspersky.
How well do you know your operating systems? Take our quiz.
Targetting AWS, Microsoft? British competition regulator soon to announce “behavioural” remedies for cloud sector
Move to Elon Musk rival. Former senior executive at X joins Sam Altman's venture formerly…
Bitcoin price rises towards $100,000, amid investor optimism of friendlier US regulatory landscape under Donald…
Judge Kaplan praises former FTX CTO Gary Wang for his co-operation against Sam Bankman-Fried during…
Explore the future of work with the Silicon In Focus Podcast. Discover how AI is…
Executive hits out at the DoJ's “staggering proposal” to force Google to sell off its…