Download Iran CERT's Flame removal tool

Powered by SC Magazine
 

Dangerous malware evaded 43 anti-virus tools.

Iran's Computer Emergency Response Team (CCCERT) has released to SC a removal tool designed to detect and remove the Flame worm described as "the most sophisticated cyber weapon yet unleashed".

The worm was detected attacking nations in the Middle East. The specific industries it targeted were unknown.

The CCERT tool can be downloaded here. It will also be available on the CCERT web site.

Users download and run the tool at their own risk.

In a VirusTotal check it was passed by 41 of 42 anti-virus tools and flagged as TrojanDownloader.Adload.rxs by Chinese security firm Jiangmin, a result which could be a false positive.

CCERT said the Windows removal tool should be run as administrator in safe mode after which it generates three zip files. It will pull infected files and logs.

The CERT said yesterday the malware could be linked to "mass breaches" in the country and was related to infamous malware application Stuxnet and Duqu.

Flame (Worm.Win32.Flame) had existed since 2010 and spread via removable  media according to the CERT and by exploiting a patched Microsoft printer hole -- the same tapped by Stuxnet.

It contained a backdoor and trojan and had worm-like features, allowing it to replicate in a local network and on removable media if it was commanded so.

Copyright © SC Magazine, Australia


Download Iran CERT's Flame removal tool
 
 
 
Top Stories
Keeping the peace
It takes a thick skin to mediate between the IT and digital camps.
 
The True Cost of BYOD - 2014 survey
Twelve months on from our first study, is BYOD a better proposition?
 
Five zero-cost ways to improve MySQL performance
How to easily boost MySQL throughput by up to 5x.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1046

Vote