Download Iran CERT's Flame removal tool

Powered by SC Magazine
 

Dangerous malware evaded 43 anti-virus tools.

Iran's Computer Emergency Response Team (CCCERT) has released to SC a removal tool designed to detect and remove the Flame worm described as "the most sophisticated cyber weapon yet unleashed".

The worm was detected attacking nations in the Middle East. The specific industries it targeted were unknown.

The CCERT tool can be downloaded here. It will also be available on the CCERT web site.

Users download and run the tool at their own risk.

In a VirusTotal check it was passed by 41 of 42 anti-virus tools and flagged as TrojanDownloader.Adload.rxs by Chinese security firm Jiangmin, a result which could be a false positive.

CCERT said the Windows removal tool should be run as administrator in safe mode after which it generates three zip files. It will pull infected files and logs.

The CERT said yesterday the malware could be linked to "mass breaches" in the country and was related to infamous malware application Stuxnet and Duqu.

Flame (Worm.Win32.Flame) had existed since 2010 and spread via removable  media according to the CERT and by exploiting a patched Microsoft printer hole -- the same tapped by Stuxnet.

It contained a backdoor and trojan and had worm-like features, allowing it to replicate in a local network and on removable media if it was commanded so.

Copyright © SC Magazine, Australia


Download Iran CERT's Flame removal tool
 
 
 
Top Stories
ANZ looks to life beyond the transaction
If digital disruptors think an online payments startup could rock the big four, they’ve missed the point of why people use banks, says Patrick Maes.
 
What InfoSec can learn from the insurance industry
[Blog post] Another way data breach laws could help manage risk.
 
A ten-point plan for disrupting security
[Blog post] How can you defend the perimeter when it’s in the cloud?
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  29%
 
Application integration concerns
  3%
 
Security and compliance concerns
  27%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  21%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 1047

Vote