The flame virus is used as an espionage technique, where computer  systems are sabotaged and vital data stolen. A famous data security  organization, Symantec Corp suspected that Iran was succumbed to this  viral attack in April. According to reliable sources, US and Israel  together developed Stuxnet, a virtual weapon sharing a similar code as  Flame and used it to slow Iran’s nuclear program. Flame is twenty times  more complex and bigger than Stuxnet, which makes it even more risky.  This virus can delete files leading to absolute failure of  mission-critical programs or disabling of operating systems. It can be  used to destroy vital infrastructure systems, like chemical and  manufacturing plants. The virus can have terrible impacts on industrial  control systems that can lead to malfunctioning of an entire nation.
There are few noteworthy source names for different module families in Flame’s source code, like:
a) Flame – Performs attack functions
b) Boost – Gathers information
c) Jimmy – Attack module type
d) Flask – Attack module type
e) Spotter – Snack modules
f) Euphoria – File leaking modules
g) Transporter – Replication modules
h) Headache – Attacks properties
The initial entry of the flame virus is vague – it can be by spearphishing or from infected websites. Later it spreads to systems connected by a LAN or via an USB drive. It can detect relevant information from passwords concealed with asterisk, take screenshots from IM programs, record vital content from verbal discussions over the microphone. Post data collection, all of it is uploaded on command servers that are distributed globally. This warfare virus is dangerous from the point of view of national security as it focuses on the masses and not on selective persons. Recently, The UN International Telecommunications Union has issued a warning to all countries to stay on high alert against attacks by this hazardous virus.
             
There are few noteworthy source names for different module families in Flame’s source code, like:
a) Flame – Performs attack functions
b) Boost – Gathers information
c) Jimmy – Attack module type
d) Flask – Attack module type
e) Spotter – Snack modules
f) Euphoria – File leaking modules
g) Transporter – Replication modules
h) Headache – Attacks properties
The initial entry of the flame virus is vague – it can be by spearphishing or from infected websites. Later it spreads to systems connected by a LAN or via an USB drive. It can detect relevant information from passwords concealed with asterisk, take screenshots from IM programs, record vital content from verbal discussions over the microphone. Post data collection, all of it is uploaded on command servers that are distributed globally. This warfare virus is dangerous from the point of view of national security as it focuses on the masses and not on selective persons. Recently, The UN International Telecommunications Union has issued a warning to all countries to stay on high alert against attacks by this hazardous virus.
 Contact Us: tweekntrick@gmail.com
Contact Us: tweekntrick@gmail.com




 
 
 
0 comments: