User not logged in - login - register
Home Calendar Books School Tool Photo Gallery Message Boards Users Statistics Advertise Site Info
go to bottom | |
 Message Boards » » I wonder who made Worm.Win32.Flame Page [1]  
TreeTwista10
minisoldr
148222 Posts
user info
edit post

I'm gonna guess the US govt

5/29/2012 12:29:56 PM

EMCE
balls deep
89740 Posts
user info
edit post

Joint venture between USA and Israel

5/29/2012 12:33:07 PM

BigMan157
no u
103353 Posts
user info
edit post

Reed Richards

5/29/2012 12:34:28 PM

gunzz
IS NÚMERO UNO
68205 Posts
user info
edit post

http://www.reuters.com/article/2012/05/28/net-us-cyberwar-flame-idUSBRE84R0E420120528

5/29/2012 12:52:35 PM

mildew
Drunk yet Orderly
14177 Posts
user info
edit post

Kaspersky


I think they make a bunch of shit that only their software can magically find

5/29/2012 1:44:28 PM

lewisje
All American
9196 Posts
user info
edit post

[mossad.gif]

5/29/2012 5:54:54 PM

LaserSoup
All American
5502 Posts
user info
edit post

Quote :
"Joint venture between USA and Israel"


We're now Super Friends after the success of Stuxnet.

5/29/2012 6:10:50 PM

GeniuSxBoY
Suspended
16786 Posts
user info
edit post

Perhaps nothing happened at all.


Guess what bill is being voted IN THE SENATE like RIGHT NOW.


C.
I.
S.
P.
A.

5/29/2012 6:31:16 PM

GeniuSxBoY
Suspended
16786 Posts
user info
edit post

Cybersecurity Act 2012, CISPA goes Undercover in the Senate
Posted on May 25, 2012 by Admin

Living not Surviving Internet Censorship advocates in Congress continue their fight against the Constitution by creating a disguise for the recent House of Representatives-passed CISPA, under the name of Cybersecurity Act 2012, or S. 2105 in the Senate.

The vote on the Cybersecurity Act is rumored to be occurring between May 28th, 2012, and June 1st, 2012, so action needs to be taken as soon as possible, as next week is a recess week for Congress. Any updates on this information will be posted here.


http://fromthetrenchesworldreport.com/cybersecurity-act-2012-cispa-goes-undercover-in-the-senate/15465



Come on guys, this game is too easy.

5/29/2012 6:36:08 PM

gunzz
IS NÚMERO UNO
68205 Posts
user info
edit post

http://www.cio.com.au/article/427005/flame_authors_order_infected_computers_remove_all_traces_malware/

Flame authors order infected computers to remove all traces of the malware

Flame has a built-in feature called SUICIDE that can be used to uninstall the malware from infected computers. However, late last week, Flame's creators decided to distribute a different self-removal module to infected computers that connected to servers still under their control, Symantec's security response team said in a blog post.

The module is called browse32.ocx and its most recent version was created on May 9, 2012. "It is unknown why the malware authors decided not to use the SUICIDE functionality, and instead make Flamer perform explicit actions based on a new module," the Symantec researchers said.

However, even though it is similar in functionality to the SUICIDE feature -- both being able to delete a large number of files associated with the malware -- the new module goes a step further.

"It locates every [Flame] file on disk, removes it, and subsequently overwrites the disk with random characters to prevent anyone from obtaining information about the infection," the Symantec researchers said. "This component contains a routine to generate random characters to use in the overwriting operation. It tries to leave no traces of the infection behind."



_____________________________________________

http://arstechnica.com/security/2012/06/flame-crypto-breakthrough/



The spy malware achieved an attack unlike any cryptographers have seen before.

"We have confirmed that Flame uses a yet unknown MD5 chosen-prefix collision attack," Marc Stevens wrote in an e-mail posted to a cryptography discussion group earlier this week. "The collision attack itself is very interesting from a scientific viewpoint, and there are already some practical implications." Benne de Weger, a Stevens colleague and another expert in cryptographic collision attacks who was briefed on the findings, concurred.

"Collision" attacks, in which two different sources of plaintext generate identical cryptographic hashes, have long been theorized. But it wasn't until late 2008 that a team of researchers made one truly practical. By using a bank of 200 PlayStation 3 consoles to find collisions in the MD5 algorithm—and exploiting weaknesses in the way secure sockets layer certificates were issued—they constructed a rogue certificate authority that was trusted by all major browsers and operating systems. Stevens, from the Centrum Wiskunde & Informatica in Amsterdam, and de Weger, of the Technische Universiteit Eindhoven were two of the seven driving forces behind the research that made that 2008 attack possible.

Flame is the first known example of an MD5 collision attack being used maliciously in a real-world environment. It wielded the esoteric technique to digitally sign malicious code with a fraudulent certificate that appeared to originate with Microsoft. By deploying fake servers on networks that hosted machines already infected by Flame—and using the certificates to sign Flame modules—the malware was able to hijack the Windows Update mechanism Microsoft uses to distribute patches to hundreds of millions of customers.

[Edited on June 11, 2012 at 2:06 PM. Reason : zxdf]

6/11/2012 2:02:13 PM

BigMan157
no u
103353 Posts
user info
edit post

6/11/2012 2:11:56 PM

 Message Boards » Chit Chat » I wonder who made Worm.Win32.Flame Page [1]  
go to top | |
Admin Options : move topic | lock topic

© 2024 by The Wolf Web - All Rights Reserved.
The material located at this site is not endorsed, sponsored or provided by or on behalf of North Carolina State University.
Powered by CrazyWeb v2.38 - our disclaimer.