Batchwiper Follows Stuxnet/Flame Onto Iranian Computers

By Robert Vamosi | 12/18/12 2:35 AM

A new data wiping malware is targeting Iranian computers networks, according to an alert from that country's Computer Emergency Response Team.

Known as Batchwiper, because the destructive element is found within a batch file, the malware systematically wipes data found on Windows-based drives with letters D through I. AlienVault has detailed analysis of Batchwiper's installation and payload.

Read More >

"MiniFlame" Is Targeted Malware, Experts Say

By Robert Vamosi | 10/15/12 4:04 AM

Researchers have identified new malware with connections to both Flame and Gauss. Previously the new malware was thought to have been just a plugin for Flame. New research shows that "miniFlame" as it is called is one of the three unknown malware packages also communicating through the Flame Command & Control servers

According to Kaspersky Labs, "The SPE malware, which we call "miniFlame", is a small, fully functional espionage module designed for data theft and direct access to infected systems. If Flame and Gauss were massive spy operations, infecting thousands of users, miniFlame/SPE is a high precision, surgical attack tool. miniFlame is in fact based on the Flame platform but is implemented as an independent module. It can operate either independently, without the main modules of Flame in the system, or as a component controlled by Flame."

Read More >

Researcher: Wiper Malware Related to Stuxnet, Duqu

By Robert Vamosi | 8/30/12 2:19 AM

Clues connecting malware that wipes a hard drive clean to state-sponsored malware have emerged.

Read More >

New Stuxnet / Flame Relative Targets Middle East Banks

By Robert Vamosi | 8/10/12 2:52 AM

A new malware that targets banks in the Middle East has its origins in code used for Stuxnet and Flame, say researchers.

Read More >

Researchers: Flame and Stuxnet Share Common Code

By Robert Vamosi | 6/11/12 6:26 AM

Stuxnet appears to have been based on the Flame malware, researchers now say.

Read More >

Clean Domains Fooled Flame's Filters

By Robert Vamosi | 6/7/12 3:05 AM

The Flame malware used brand-new new domains for its Command and Control servers, thus evading automatic filtering, a traditional method of discovering and blocking malware, according to one expert.

Read More >
COMMENTS
Aenean sollicitudin, lorem quis bibendum auctor, nisi elit consequat ipsum.
Insert CTA Here