Ever wonder if it was possible to hack into a jet, fire its missiles, and land it just in time to prevent a biochemical attack? Me neither. But what about gaining access to a laptop? What about being able to access its desktop and use its microphone? Can imagine how much information could be gathered? I’ve noticed this in quite a few Hollywood movies and I really didn’t think it was as simple as they portray it to be.
So what am I going to be talking about? Three newly discovered derivatives or strains of the malware known as Flame that are floating around in the wild. If you aren’t familiar with Flame, it’s a modularized malware program that facilitates other malicious program modules to inject code into running processes. I guess it’s very similar to Stuxnet and Duqu, but its intent isn’t to sabotage. Instead, Flame was designed for espionage purposes and has primarily been detected in Middle Eastern nations aka the adversaries of the US. I found another little piece of information. This summer, on June 19th, A Washington Post article claimed that Flame originated from the US and Israel. The US officially denies involvement, typical, but something tells me that’s not true. The report claims that Flame was used to gather information to propel the Stuxnet attacks, both of which are just a part of a large-scale attack.
Let’s start to think about the impact of wild derivatives of a malware program that may have been developed by several nations, is hard to detect, can erase its tracks, and can extract a substantial amount of information. Depending on the target, if there is any specific target at least, the impact could be devastating.
I haven’t read anything about any claims to ownership of these derivatives. What if the targets change?