The flame virus is used as an espionage technique, where computer systems are sabotaged and vital data stolen. A famous data security organization, Symantec Corp suspected that Iran was succumbed to this viral attack in April. According to reliable sources, US and Israel together developed Stuxnet, a virtual weapon sharing a similar code as Flame and used it to slow Iran’s nuclear program. Flame is twenty times more complex and bigger than Stuxnet, which makes it even more risky. This virus can delete files leading to absolute failure of mission-critical programs or disabling of operating systems. It can be used to destroy vital infrastructure systems, like chemical and manufacturing plants. The virus can have terrible impacts on industrial control systems that can lead to malfunctioning of an entire nation.
There are few noteworthy source names for different module families in Flame’s source code, like:
a) Flame – Performs attack functions
b) Boost – Gathers information
c) Jimmy – Attack module type
d) Flask – Attack module type
e) Spotter – Snack modules
f) Euphoria – File leaking modules
g) Transporter – Replication modules
h) Headache – Attacks properties
The initial entry of the flame virus is vague – it can be by spearphishing or from infected websites. Later it spreads to systems connected by a LAN or via an USB drive. It can detect relevant information from passwords concealed with asterisk, take screenshots from IM programs, record vital content from verbal discussions over the microphone. Post data collection, all of it is uploaded on command servers that are distributed globally. This warfare virus is dangerous from the point of view of national security as it focuses on the masses and not on selective persons. Recently, The UN International Telecommunications Union has issued a warning to all countries to stay on high alert against attacks by this hazardous virus.
There are few noteworthy source names for different module families in Flame’s source code, like:
a) Flame – Performs attack functions
b) Boost – Gathers information
c) Jimmy – Attack module type
d) Flask – Attack module type
e) Spotter – Snack modules
f) Euphoria – File leaking modules
g) Transporter – Replication modules
h) Headache – Attacks properties
The initial entry of the flame virus is vague – it can be by spearphishing or from infected websites. Later it spreads to systems connected by a LAN or via an USB drive. It can detect relevant information from passwords concealed with asterisk, take screenshots from IM programs, record vital content from verbal discussions over the microphone. Post data collection, all of it is uploaded on command servers that are distributed globally. This warfare virus is dangerous from the point of view of national security as it focuses on the masses and not on selective persons. Recently, The UN International Telecommunications Union has issued a warning to all countries to stay on high alert against attacks by this hazardous virus.
No comments:
Post a Comment
THANK YOU FOR COMMENT ON HTTP://TWEEKNTRICK.blogspot.com