It's a Windows worm called "Flame", and it is twenty times more complex than Stuxnet.
http://threatpost.com/en_us/blogs/wh...malware-061512
Here is a step-by-step analysis of Flame, and the computing power necessary to generate a certificate using collision.
https://speakerdeck.com/u/asotirov/p...ision-in-flame
http://threatpost.com/en_us/blogs/wh...malware-061512
During the analysis of the Flame malware, researchers discovered that one of the unique features of the worm was its use of a forged Microsoft certificate. The attackers used that certificate to set up a seemingly valid Windows Update server inside an infected organization and then have clients connect to the server, ostensibly for Microsoft updates, and then install the Flame malware on those machines.
...
But things changed rather quickly when word leaked out via a David Sanger piece in The New York Times that the U.S. and Israel actually did build Stuxnet. Then researchers said that some of the same components found in Stuxnet also are present in Flame, and that the same attackers likely built both tools. Flame is actually the oldest of the three pieces of malware and has been in circulation for at least five years, meaning that the team behind them has been operating for a long time.
...
But things changed rather quickly when word leaked out via a David Sanger piece in The New York Times that the U.S. and Israel actually did build Stuxnet. Then researchers said that some of the same components found in Stuxnet also are present in Flame, and that the same attackers likely built both tools. Flame is actually the oldest of the three pieces of malware and has been in circulation for at least five years, meaning that the team behind them has been operating for a long time.
https://speakerdeck.com/u/asotirov/p...ision-in-flame
Comment