And assumedly some pretty stringent testing... 0-day exploits,
propagation, detection-evading, command and control behavior, etc... One
would assume they'd want to test in private so as to avoid early
detection by the AV community....
 
-sc
 
From: Andrew S. Baker [mailto:[email protected]] 
Sent: Thursday, May 31, 2012 10:03 AM
To: NT System Admin Issues
Subject: Re: Flame bait...
 
Indeed.
 
Goes to show that any language can be made to do things which were not
intended by the language authors.   I wonder if it will help shed light
on who was involved in the development?
 
Can you imagine the code review process for this level of malware?

ASB
http://XeeMe.com/AndrewBaker
Harnessing the Advantages of Technology for the SMB market...



On Thu, May 31, 2012 at 9:56 AM, Steven M. Caesare
<[email protected]> wrote:
There's a lot being made of (portions of) it being written in Lua....
Which seems to be a tad unusual .
 
-sc
 
From: Andrew S. Baker [mailto:[email protected]] 
Sent: Wednesday, May 30, 2012 11:01 PM

To: NT System Admin Issues
Subject: Re: Flame bait...
 
Given that is has been successfully running for at least 2 years, and
possibly more, I'd say it has already been a success.
 
I'm still looking for evidence that its payload isn't at least partially
encrypted.
 
--------
"Flame is controlled via an SSL channel by a C&C infrastructure spread
all around the world, ranging from 50 (Kaspersky) to 80 (CrySyS)
different domains;
--------
 
 
http://www.wired.com/beyond_the_beyond/2012/05/flame-a-cyberweapon-that-
makes-stuxnet-look-cheap/ 
 


ASB
http://XeeMe.com/AndrewBaker
Harnessing the Advantages of Technology for the SMB market...
 
On Wed, May 30, 2012 at 10:33 PM, Ken Schaefer <[email protected]>
wrote:
If this was such a sophisticated piece of malware, it could have just
encrypted everything prior to sending it out: to a scanner it would just
look like binary gibberish.
 
-----Original Message-----
From: Kurt Buff [mailto:[email protected]]
Sent: Thursday, 31 May 2012 7:45 AM
To: NT System Admin Issues
Subject: Flame bait...

So, this is getting a lot of hype right now:
http://www.computerworld.com/s/article/9227524/Researchers_identify_Stux
net_like_malware_called_Flame_

And a thought just occurred to me...

A lot of gateways that scan things (email, web, etc. - and a lot of AV
programs on end points, too) are configured to ignore chunks of data
over a megabyte or two...

I wonder if that has played to the advantage of this bit of malware?

Kurt
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here:
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin

Reply via email to