Difference between revisions of "31 May 2012"

From Organic Design wiki
(Replication via Windows Update MITM proxy server - Aleks, Kaspersky Lab Expert)
(US+Israel developed Flame, officials say)
 
(One intermediate revision by the same user not shown)
Line 9: Line 9:
  
 
'''Updates:'''
 
'''Updates:'''
*[http://arstechnica.com/security/2012/06/flame-crypto-breakthrough/ Crypto breakthrough shows Flame was designed by world-class scientists] ''- by Dan Goodin - June 7 2012''
+
*[http://www.washingtonpost.com/world/national-security/us-israel-developed-computer-virus-to-slow-iranian-nuclear-efforts-officials-say/2012/06/19/gJQA6xBPoV_story.html US+Israel developed Flame, officials say]
*[http://arstechnica.com/security/2012/06/why-antivirus-companies-like-mine-failed-to-catch-flame-and-stuxnet/ Why antivirus companies like mine failed to catch Flame and Stuxnet] ''- F-Secure's Chief Research Officer: A/V outfits were out of their league''
+
*[http://arstechnica.com/security/2012/06/flame-crypto-breakthrough/ Crypto breakthrough shows Flame was designed by world-class scientists]
 +
:''- by Dan Goodin - June 7 2012''
 +
*[http://arstechnica.com/security/2012/06/why-antivirus-companies-like-mine-failed-to-catch-flame-and-stuxnet/ Why antivirus companies like mine failed to catch Flame and Stuxnet]
 +
:''- F-Secure's Chief Research Officer: A/V outfits were out of their league''
 
*[http://arstechnica.com/security/2012/06/flames-god-mode-cheat-code-wielded-to-hijack-windows-7-server-2008/ Flame's "god mode cheat code" wielded to hijack Windows 7, Server 2008]
 
*[http://arstechnica.com/security/2012/06/flames-god-mode-cheat-code-wielded-to-hijack-windows-7-server-2008/ Flame's "god mode cheat code" wielded to hijack Windows 7, Server 2008]
 
*[http://www.securelist.com/en/blog/208193566/Flame_Replication_via_Windows_Update_MITM_proxy_server Replication via Windows Update MITM proxy server] ''- Aleks, Kaspersky Lab Expert''
 
*[http://www.securelist.com/en/blog/208193566/Flame_Replication_via_Windows_Update_MITM_proxy_server Replication via Windows Update MITM proxy server] ''- Aleks, Kaspersky Lab Expert''
 
}}
 
}}

Latest revision as of 03:27, 20 June 2012

Warning.svg This is a blog item that needs to be converted to the new Bliki format


Iran invites malware into their nuclear facilities

Flame-Windows.jpg

After Obama and Israel released the Stuxnet worm to attack Irans nuclear facilities in 2010, another virus being called Flame has now been discovered which does even more damage.

Infiltration of the computer systems in a tightly secured nuclear facility would normally be a practically impossible task, but the US and Israel had an amazing stroke of good luck; they discovered that Iran was using Windows operating systems in its nuclear facilities which are renowned for being the most insecure and vulnerable operating systems currently available!

So once this valuable piece of information was known it was a simple matter of applying a few of the well known Windows exploits, such as putting some malicious code into removable media's autorun.inf files or gaining complete control of a machine via flaws in the graphical user interface programming.

It seems almost like Iran was inviting such an attack - why on earth would such insecure software be used for something so security sensitive? why would they carry on using Windows after being infected by Stuxnet? why are they even supporting US companies with their IT budget? It seems to be about as ridiculous as the death star having a self-destruct button in the middle just waiting for a Jedi to fly in and press it!

Updates:

- by Dan Goodin - June 7 2012
- F-Secure's Chief Research Officer: A/V outfits were out of their league