U.S., Israel use STUXNET virus to create Flame virus | Government and Political Conspiracies | Forum

A A A
Avatar

Please consider registering
guest

sp_LogInOut Log In sp_Registration Register

Register | Lost password?
Advanced Search

— Forum Scope —






— Match —





— Forum Options —





Minimum search word length is 3 characters - maximum search word length is 84 characters

sp_Feed Topic RSS sp_TopicIcon
U.S., Israel use STUXNET virus to create Flame virus
June 25, 2012
10:59 am
Avatar
rath
Member
Members
Forum Posts: 4297
Member Since:
April 9, 2009
sp_UserOfflineSmall Offline

Stuxnet, your open source weapon.

Stuxnet is a computer worm discovered in June 2010. Stuxnet initially spreads via Microsoft Windows, and targets Siemens industrial software and equipment. While it is not the first time that hackers have targeted industrial systems, it is the first discovered malware that spies on and subverts industrial systems, Power Stations, Water company's, Nuclear plants, ect ect, and the first to include a programmable logic controller (PLC) rootkit.
The worm initially spreads indiscriminately,

Stuxnet (HUNGRY BEAST) Jun 8, 2011

[BBvideo 425,350][/BBvideo]

U.S., Israel developed Flame computer virus to slow Iranian nuclear efforts, officials say

The United States and Israel jointly developed a sophisticated computer virus nicknamed Flame that collected intelligence in preparation for cyber-sabotage aimed at slowing Iran’s ability to develop a nuclear weapon, according to Western officials with knowledge of the effort.

The massive piece of malware secretly mapped and monitored Iran’s computer networks, sending back a steady stream of intelligence to prepare for a cyber­warfare campaign, according to the officials.

The effort, involving the National Security Agency, the CIA and Israel’s military, has included the use of destructive software such as the Stuxnet virus to cause malfunctions in Iran’s nuclear-enrichment equipment.

The emerging details about Flame provide new clues to what is thought to be the first sustained campaign of cyber-sabotage against an adversary of the United States.

“This is about preparing the battlefield for another type of covert action,” said one former high-ranking U.S. intelligence official, who added that Flame and Stuxnet were elements of a broader assault that continues today. “Cyber-collection against the Iranian program is way further down the road than this.”

Flame came to light last month after Iran detected a series of cyberattacks on its oil industry. The disruption was directed by Israel in a unilateral operation that apparently caught its American partners off guard, according to several U.S. and Western officials who spoke on the condition of anonymity.

There has been speculation that Washington had a role in developing Flame, but the collaboration on the virus between the United States and Israel has not been previously confirmed. Commercial security researchers reported last week that Flame contained some of the same code as Stuxnet. Experts described the overlap as DNA-like evidence that the two sets of malware were parallel projects run by the same entity.

Spokesmen for the CIA, the NSA and the Office of the Director of National Intelligence, as well as the Israeli Embassy in Washington, declined to comment.

The virus is among the most sophisticated and subversive pieces of malware to be exposed to date. Experts said the program was designed to replicate across even highly secure networks, then control everyday computer functions to send secrets back to its creators. The code could activate computer microphones and cameras, log keyboard strokes, take screen shots, extract geo­location data from images, and send and receive commands and data through Bluetooth wireless technology.

Flame was designed to do all this while masquerading as a routine Microsoft software update; it evaded detection for several years by using a sophisticated program to crack an encryption algorithm.

“This is not something that most security researchers have the skills or resources to do,” said Tom Parker, chief technology officer for FusionX, a security firm that specializes in simulating state-sponsored cyberattacks. He said he does not know who was behind the virus. “You’d expect that of only the most advanced cryptomathematicians, such as those working at NSA.”

July 3, 2012
8:15 pm
Avatar
rath
Member
Members
Forum Posts: 4297
Member Since:
April 9, 2009
sp_UserOfflineSmall Offline

Japan earthquake, tsunami and Fukushima nuclear disaster: 2011 review

http://www.telegraph.co.uk/news/worldne ... osion.html

Forum Timezone: America/Los_Angeles

Most Users Ever Online: 288

Currently Online:
49 Guest(s)

Currently Browsing this Page:
1 Guest(s)

Top Posters:

greeney2: 10232

bionic: 9870

at1with0: 9243

Lashmar: 5289

tigger: 4576

rath: 4297

DIss0n80r: 4161

sandra: 3858

frrostedman: 3815

Wing-Zero: 3278

Member Stats:

Guest Posters: 2

Members: 24016

Moderators: 0

Admins: 2

Forum Stats:

Groups: 8

Forums: 31

Topics: 8696

Posts: 123380

Newest Members:

Melanie, chetney sessoms, Horatius, Express Documents, PaulDee094, Gary Wayne Ponder, AuthenticDocuments, matic mogan, nativembonyesiwe, laguse

Administrators: John Greenewald: 570, blackvault: 1776