The recent
discovery of a computer virus has confirmed fears that the world has entered a
new age of cyber espionage and sabotage.
Security
experts discovered a highly complex computer virus, referred to as super virus,
in Iran and other states of the Middle East which they believe was deployed at
least five years ago to engage in espionage and the prime targets so far have
been energy facilities. There is purportedly evidence to suggest that the virus
named FLAME may have been commissioned by or on behalf of the same nation or
group of nations that commissioned the STUXNET worm responsible for attacking
Iran’s nuclear programme in 2010.
It
is the third cyber attack weapon targeting systems in the Middle East to be
exposed in recent years.
Iran
has alleged that the West and Israel are orchestrating a secret war of sabotage
using cyber warfare and targeted assassinations of its scientists as part of
the dispute over its nuclear programme. The suspicion is that, it is Israel’s crack
Unit 8200 which possibly developed this cyber espionage tool.
Stuxnet attacked Iran's nuclear
programme in 2010, while a related programme, Duqu, named after the Star Wars
villain, stole data. Unlike
the Stuxnet virus, which attacked an Iranian enrichment facility, causing
centrifuges to fail, Flame does not disrupt or terminate systems. Flame can
gather data files, remotely change settings on computers, turn on computer
microphones to record conversations, take screen shots and copy instant
messaging chats. Experts describe it as a multitasking mole. It can wipe data
off hard drives, but also be a tireless eavesdropper by activating audio
systems to listen in on Skype calls or office chatter. It also can also take
screenshots, log keystrokes and - in one of its more novel functions- steal
data from Bluetooth-enabled mobile phones.
Kaspersky
Labs said the programme appeared to have been released five years ago and had
infected machines in Iran, Israel, Sudan, Syria, Lebanon, Saudi Arabia and
Egypt.
"If
Flame went on undiscovered for five years, the only logical conclusion is that
there are other operations ongoing that we don't know about," Roel
Schouwenberg, a Kaspersky security senior researcher, said.
Professor
Alan Woodward from the department of computing at the University of Surrey said
the virus was extremely invasive. It could "vacuum up" information by
copying keyboard strokes and the voices of people nearby.
The
virus contains about 20 times as much code as Stuxnet, which attacked an
Iranian uranium enrichment facility, causing centrifuges to fail. Iran's output
of uranium was suffered a severe blow as a result of the Stuxnet activities. In
fact, the Flame malware is much larger than Stuxnet and is protected by
multiple layers of encryption.
Schouwenberg
said there was evidence to suggest the code was commissioned by the same nation
or nations that were behind Stuxnet and Duqu hinting thereby that Israel and/or the United States were the brains behind the virus.
Iran's
Computer Emergency Response Team said it was "a close relation" of
Stuxnet, which has itself been linked to Duqu, another complicated
information-stealing virus which was believed to be the work of state intelligence.
It
said organisations had been given software to detect and remove the
newly-discovered virus at the beginning of May.
Crysys
Lab, which analyses computer viruses at Budapest University said the technical
evidence for a link between Flame and Stuxnet or Duqu was inconclusive.
The
newly-discovered virus does not spread itself automatically but only when
hidden controllers allow it.
Unprecedented
layers of software allow Flame to penetrate remote computer networks undetected.
The
file, which infects Microsoft Windows computers, has five encryption
algorithms, exotic data storage formats and the ability to steal documents, spy
on computer users and more.
Components
enable those behind it, who use a network of rapidly-shifting "command and
control" servers to direct the virus, to turn microphone into listening
devices, siphon off documents and log keystrokes.
Eugene
Kaspersky, the founder of Kaspersky Labs, noted that "it took us 6 months
to analyse Stuxnet. [This] is 20 times more complicated".
Once
a machine is infected additional modules can be added to the system allowing
the machine to undertake specific tracking projects.
Flame
uses at least 80 different servers and domain names to relay its data back
home, so it is extremely difficult to track usage and where the information is
transferred.
As
has been stated, none of the experts in the field are willing to state on
record as to who could be behind this complex super virus. Speculation has been
that either Israel or Israel in conjunction with the US could possibly have
developed this deadly programme. Israel has the necessary expertise in
developing tools of cyber espionage and cyber warfare. Unit 8200 (Unit Eight Two-hundred) (or shmone matayim
in Hebrew) referred to earlier is an Israeli Intelligence Corps unit,
responsible for collection of signal intelligence and code decryption. It is
also known in military publications as the Central Collection Unit of the
Intelligence Corps. This Unit is alleged to have developed the computer worm
Stuxnet which targetted the Iranian nuclear programme in 2010.
Israel
is the master of cyber warfare. If Israel has been responsible for launching
Flame using gaming code, then certainly Israel has revolutionized espionage by
going high tech, obviating the necessity of sending in human agents. At this
point of time one can only speculate as to how Israel might 'successfully'
disable Iran’s nuclear enrichment program and its economy with greater dexterity
than the bludgeon of more legislated 'tougher sanctions' or a conventional
military strike.
Cyber-snooping has indeed been revolutionised with the introduction of this new virus.