Israel Hints at Role in New ‘Super Virus’ Spreading Across Mideast
2012 05 30
By Jason Ditz | AntiWar.com
Surveillance Virus ’Flame’ Already Cropping Up Region-Wide
The new “Flame” surveillance virus that has been hitting computers across the Middle East appears to have come from Israel in an attempt to attack computers related to Iran’s nuclear program.
Russian-based Kaspersky Lab was the first to tap Israel as a likely source, and Vice PM Moshe Yaalon did nothing to deny it when asked, saying that Israel is “blessed as being a country rich with high-tech” and that Israel takes pride in the “opportunities” this has given them.
Though the outbreak appears to have hit Iran first, it very quickly spread across the region, with computers as far away as Saudi Arabia, Sudan and Egypt showing up infected, including those in the Israeli-occupied West Bank.
The virus appears initially targeted at data theft, and reportedly can even turn on a user’s microphone so Israel can record conversations remotely. Experts say it has a remarkable level of complexity for a piece of malware.
It is not the first attempt at destructive software targeted at Iran, as the US and Israel unleashed the Stuxnet virus, damaging industrial equipment across Iran, in 2009-2010.
Such attacks can have unforeseen side effects, however, as a number of other hackers released altered versions, using the government designed worm as a template, and it continues to cause problems to this day. Given Flame’s more advanced nature, it too is a likely candidate for copy-cats, and could cause havoc for years to come.
Article from: antiwar.com
Video from: YouTube.com
Flame virus set to spread like wildfire
RedIce Ed Note: Setup for a False Flag Cyber Terror Attack (to be blamed on Anonymous or other ’Hacker’ organizations)?
It is perhaps the most sophisticated piece of malicious software ever designed – a digital surveillance device so complex it ran on sensitive government computer networks for years, undetected.
And now, a tool that was almost certainly developed for state-sanctioned cyberwarfare is out in the open, soon to make its way into the hands of everyone from computer virus researchers to criminal gangs.
Given the complexity of the software, it likely took Flame’s authors millions of dollars and years of development to build. But now, Mr. Kellermann cautioned, what was a highly secret piece of software is going to find its way to the Web’s black market.
“The second it’s discovered, you’ll start to see immediate replication of this attack code in the underground,” he said. “If it was a nation state [that built Flame], now Joe the hacker and his friends can replicate this themselves.”
“You can immediately eliminate certain parties,” said Vikram Thakur, principal security response manager at computer security software producer Symantec. “Who would want to run a long-standing campaign against individuals in the Middle East? Who would have the funding to sustain this for years? You can pretty much eliminate the basement hacker from being the potential author.”
Source - GlobeAndMail.com
Flame virus hit Iran’s oil industry but officials say antidote found
Iran’s government-run Maher Computer Emergency Response Team Co-ordination Centre has said the highly sophisticated Flame virus appeared linked to espionage but cited no specific country or source.
Ali Hakim Javadi, Iran’s deputy minister of communications and information technology, was quoted by the official IRNA news agency as saying Wednesday that Iranian experts have already produced an anti-virus capable of identifying and removing Flame from computers.
The Maher center "has produced an anti-virus capable of detecting and removing the Flame for the first time in the world," IRNA quoted Javadi as saying. "The anti-virus software was delivered to selected organizations in early May."
The Russian Internet security firm Kaspersky Lab said the Flame virus is unprecedented in size and complexity.
Kaspersky’s conclusion that the virus was crafted at the behest of a national government has fueled speculation it could be part of an Israeli-backed campaign of electronic sabotage against the Jewish state’s archenemy.
The virus can activate a computer’s audio systems to listen in on Skype calls or office chatter. It can also take screenshots, log keystrokes and — in one of its more novel functions — steal data from Bluetooth-enabled cellphones.
Read the full article at: cbc.ca
Religion riskier than porn for online viruses: study
Stuxnet Virus found in Japan (Oct. 5, 2010) - power plants targeted
First Human ’Infected with Computer Virus’
VeriChip Shares Jump After Patent Win on Implantable H1N1 Virus Detection Systems in Humans
Flame Virus explained: How it works and who’s behind it
Latest News from our Front Page
If Someone Secretly Controlled What You Say, Would Anyone Notice?
2014 10 01
The subject enters a room in which a 12-year-old boy is seated. A 20-minute conversation ensues. The subject quizzes the boy about current events and other topics to get a sense of his intelligence and personality. But the boy is not what he appears to be.
Unbeknownst to the subject, the boy is wearing a radio receiver in his ear, and ...
Obama has had accurate intelligence about ISIS since BEFORE the 2012 election, says administration insider
2014 10 01
‘President Barack Obama’s intelligence briefings have provided him with specific information since before he won re-election in 2012 about the growing threat of the terror group now known alternatively as ISIS and ISIL, an administration insider told MailOnline on Monday.
‘Unless someone very senior has been shredding the president’s daily briefings and telling him that the dog ate them, highly accurate ...
Can holding a magnet against your head help defeat depression?
2014 10 01
Former GP Sue Mildred suffered from crippling depression and anxiety for 20 years.
On two occasions it was so severe that she ended up in hospital, and for 15 years she was unable to work.
Sue, 51, has tried antidepressants, talking therapies and, out of desperation, even ECT (electro-convulsive therapy), where an electric current is passed through the brain.
This did ...
Extremists to have Facebook and Twitter vetted by anti-terror police
2014 09 30
Theresa May to announce new Extremist Disruption Orders to strengthen counter-terrorism if the Tories win the next general election
Extremists will have to get posts on Facebook and Twitter approved in advance by the police under sweeping rules planned by the Conservatives.
They will also be barred from speaking at public events if they represent a threat to “the functioning of democracy”, ...
Scottish Independence: Protesters demand revote
2014 09 30
Pro-independence campaigners gathered outside the Scottish Parliament for the second day in a row, this time to demand a revote of the September 18 referendum.
While yesterday’s “Rally For A Revote” saw the return of Saltires and Yes banners to Holyrood, it did not match the turnout for the “Voice Of The People” rally held on Saturday, when up 3000 people ...
|More News » |