Russian Hackers Use Twitter to Hack US Computers


Recently the US government and defence industry computers were hacked. According to experts hackers used photos on Twitter for the cyber-attack. The malicious data was hidden in the benign photos....

Herding Cats And Other Friday-Before-The-Super-Bowl Stories


I was delighted that when Search Engine Journal identified the 25 greatest Super Bowl commercials of all time this week that on the list, among the beer, snack, and soda ads, were two technology ads...

Symantec: work on Stuxnet worm started two years earlier than first thought

Symantec work on Stuxnet worm started two years earlier than thought

Most of us think we know the tale of Stuxnet: it's a possibly government-sponsored worm that played havoc with Iranian centrifuges in 2009, setting back the country's uranium enrichment program without involving any traditional weapons. Researchers at Symantec, however, now claim there's an untold narrative. They've discovered a Stuxnet 0.5 version that may have been in development or active as soon as November 2005, two years before the commonly accepted timeline. It first surfaced on trackers in November 2007, and would have created wider-ranging chaos at Iran's Natanz nuclear facility by closing vital pressure valves instead of using the subtler centrifuge technique.

Symantec also noticed that this pre-1.0 malware shares traits with the Flamer code base, putting it in the context of an even larger effort than seen so far. Moreover, it would have required extensive knowledge of the Natanz infrastructure -- this was no casual attack, according to the researchers. While we may never know exactly what prompted the revamp, IAEA evidence suggests that Stuxnet wasn't truly effective until the better-known version came into play. We mostly know that modern cyberwarfare had its fair share of growing pains -- and that it's not as fresh-faced as we assumed.

Filed under:

Comments

Via: Ars Technica

Source: Symantec (PDF)

Security researchers dissect Flame’s handling program, find three new viruses ‘at large’

Security researchers dissect Flame's handling program, find three new viruses 'at large'

It seems that there's more than two out-of-control computer viruses roaming around the Middle East. Security researchers think that a further three could be operating "at large," with one positively identified on machines in Iran and Lebanon. Teams from Symantec and Kaspersky have separately found that the Flame malware had the electronic equivalent of a "handler," a program called NEWSFORYOU, which is also in charge of three viruses that are code-named SP, SPE and IP. The two teams have been unsuccessful in finding a sample of the trio for analysis and despite finding a cache of data on a command-and-control server, decoding it is "virtually impossible." While both security companies have declined to point a finger as to their origin, Reuters' sources suggest the United States, while The Washington Post has been told that the project was a joint-enterprise with Israel -- in keeping with the existing narrative that the pair were behind Stuxnet.

Filed under: , ,

Security researchers dissect Flame's handling program, find three new viruses 'at large' originally appeared on Engadget on Mon, 17 Sep 2012 13:51:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceReuters, Kaspersky, Symantec  | Email this | Comments

Security researchers dissect Flame’s handling program, find three new viruses ‘at large’

Security researchers dissect Flame's handling program, find three new viruses 'at large'

It seems that there's more than two out-of-control computer viruses roaming around the Middle East. Security researchers think that a further three could be operating "at large," with one positively identified on machines in Iran and Lebanon. Teams from Symantec and Kaspersky have separately found that the Flame malware had the electronic equivalent of a "handler," a program called NEWSFORYOU, which is also in charge of three viruses that are code-named SP, SPE and IP. The two teams have been unsuccessful in finding a sample of the trio for analysis and despite finding a cache of data on a command-and-control server, decoding it is "virtually impossible." While both security companies have declined to point a finger as to their origin, Reuters' sources suggest the United States, while The Washington Post has been told that the project was a joint-enterprise with Israel -- in keeping with the existing narrative that the pair were behind Stuxnet.

Filed under: , ,

Security researchers dissect Flame's handling program, find three new viruses 'at large' originally appeared on Engadget on Mon, 17 Sep 2012 13:51:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceReuters, Kaspersky, Symantec  | Email this | Comments