Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Cybersleuths see link between Flame, Stuxnet virus
Monday - 6/11/2012, 3:48pm EDT
LONDON (AP) - Cybersecurity researchers said Monday that they'd found a link between the infrastructure-wrecking cyberweapon known as Stuxnet and the recently- discovered Flame virus _ possibly offering a new clue about the latter's origins.
Kaspersky Labs expert Alexander Gostev said in a blog post that his company had identified a similarity between a subset of the code used in Flame and another set of code used in an early version of Stuxnet, which is believed to have been aimed at Iran's disputed nuclear program.
Kaspersky had previously said that while Flame and Stuxnet spread in similar ways, the two worked off of different coding platforms.
"It turns out we were wrong," Gostev said. "Wrong, in that we believed Flame and Stuxnet were two unrelated projects."
Alan Woodward, a cybersecurity researcher at the University of Surrey in southern England, backed Kaspersky's analysis, saying that the similarity they identified "does suggest that very early on there was some sharing" between the viruses' authors.
The discovery of Stuxnet revolutionized the cybersecurity field because it appeared aimed at damaging centrifuges used in Iran's nuclear program _ the most high-profile example of malicious software being used to wreak havoc in the physical world.
Speculation as to the virus' authorship quickly settled around Israel or the United States, a theory which was given new credence by an article in The New York Times detailing how President Barack Obama ordered a wave of cyberattacks _ code- named Olympic Games _ which included unleashing Stuxnet against Iran's underground nuclear plant at Natanz.
The article also claimed that Israelis cooperated with the highly classified project.
The Times drew on anonymous sources, but its detailed description of conversations in the Oval Office among Obama, the vice president and the CIA director, was the most direct evidence to date of U.S. responsibility for Stuxnet.
The newspaper cited unnamed officials as denying that Flame was part of Olympic Games, but if Kaspersky is correct, then that suggests some sort of a relationship between the two projects.
The debate over the potency of Flame continues. The oversize virus is a kind of surveillance Swiss army knife, capable of turning on a computer's microphones, taking screenshots of its monitor, and _ in one of its more novel attacks _ sucking data from unsecured, Bluetooth-enabled cellphones left nearby.
Some researchers say the program isn't nearly as complex as Stuxnet and note that many of its functions have been seen before. But Marco Obiso, cybersecurity coordinator at the Geneva-based International Telecommunication Union, told The Associated Press late last month that Flame was one of the most serious threats his organization had ever come across.
Raphael Satter can be reached at: http://twitter.com/razhael
(Copyright 2012 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.)
This story is part of Federal News Radio's daily Cybersecurity Update. For more cybersecurity news, click here.