Download Iran CERT's Flame removal tool

Powered by SC Magazine
 

Dangerous malware evaded 43 anti-virus tools.

Iran's Computer Emergency Response Team (CCCERT) has released to SC a removal tool designed to detect and remove the Flame worm described as "the most sophisticated cyber weapon yet unleashed".

The worm was detected attacking nations in the Middle East. The specific industries it targeted were unknown.

The CCERT tool can be downloaded here. It will also be available on the CCERT web site.

Users download and run the tool at their own risk.

In a VirusTotal check it was passed by 41 of 42 anti-virus tools and flagged as TrojanDownloader.Adload.rxs by Chinese security firm Jiangmin, a result which could be a false positive.

CCERT said the Windows removal tool should be run as administrator in safe mode after which it generates three zip files. It will pull infected files and logs.

The CERT said yesterday the malware could be linked to "mass breaches" in the country and was related to infamous malware application Stuxnet and Duqu.

Flame (Worm.Win32.Flame) had existed since 2010 and spread via removable  media according to the CERT and by exploiting a patched Microsoft printer hole -- the same tapped by Stuxnet.

It contained a backdoor and trojan and had worm-like features, allowing it to replicate in a local network and on removable media if it was commanded so.

Copyright © SC Magazine, Australia


Download Iran CERT's Flame removal tool
 
 
 
Top Stories
CIO exits as Coles steps up offshoring
Updated: Engages Accenture in Manila; staff to learn of their fate today.
 
Matching databases to Linux distros
Reviewed: OS-repository DBMSs, MariaDB vs MySQL.
 
Coalition's NBN cost-benefit study finds in favour of MTM
FTTP costs too much, would take too long.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  71%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 794

Vote