US, Israel built Flame: Report

Powered by SC Magazine
 

Sources say malware paved the way for Stuxnet.

The United States and Israel developed the Flame malware to gather intelligence on Iranian networks ahead of the attack by Stuxnet, Western officials said.

Unnamed sources speaking to the Washington Post said the espionage malware was developed under the same 'Olympic Games' internal project which reportedly gave rise to Stuxnet.

Those sources said the malware was developed by the US National Security Agency, the Central Intelligence Agency and Israel’s military, although the agencies refused to comment.

Flame was surveillance malware and could record audio, keystrokes and even Bluetooth devices. Sources told the Washington Post it paved the way for Stuxnet and was “about preparing the battlefield for another type of covert action”.

The malware was responsible for damaging key parts of Iran’s oil sector in April, the country’s Computer Emergency Response Team told SC, forcing the country's main export terminal offline.

The revelations confirm existing suspicions that Flame and Stuxnet were developed by the same engineers, a notion first flagged by Kaspersky security analyst Alexander Gostev, who spotted a shared zero-day hole present in Flame and an early version of Stuxnet.

Last month, Israel's vice premier failed to deflect suspicion about the nation's involvement in the creation of Flame.

He told Army Radio that "whoever sees the Iranian threat as a significant threat is likely to take various steps, including these, to hobble it” adding that "Israel is blessed with high technology, and we boast tools that open all sorts of opportunities for us".

Copyright © SC Magazine, Australia


US, Israel built Flame: Report
 
 
 
Top Stories
Turnbull introduces data retention legislation
Still no definition of metadata to be stored.
 
Images: the next frontier in data analytics?
Barclay’s global data chief says we’re still at the starting line.
 
Crime Commission prepares core systems overhaul
Will replace 30 year-old national criminal database.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  27%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  25%
TOTAL VOTES: 417

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  55%
 
No
  45%
TOTAL VOTES: 196

Vote