Software news

Subscribe to industry newsletters

Press offices

Enquire about a press office
Bizcommunity has over 400 industry contributors and we always welcome further contributions and contributors.
Advertise with us
Advertise & RatesMy Account
Company press officeList company
Recruitment packagesSubmit job ad
Download ratecard
Software news

Kaspersky Lab discovers new cyber espionage programme

19 Oct 2012 07:33
Kaspersky Lab has announced the discovery of miniFlame, a small and highly flexible malicious programme designed to steal data and control infected systems during targeted cyber espionage operations.
miniFlame, also known as SPE, was found by Kaspersky Lab's experts in July 2012, and was originally identified as a Flame module. However, in September 2012, Kaspersky Lab's research team conducted an in-depth analysis of Flame's command and control servers (C&C) and from the analysis found that the miniFlame module was actually an inter-operable tool that could be used as an independent malicious programme, or concurrently as plug-in for both the Flame and Gauss malware.

Analysis of miniFlame showed there were several versions created between 2010 and 2011, with some variants still being active in the wild. The analysis also revealed new evidence of the cooperation between the creators of Flame and Gauss, as both malicious programmes can use miniFlame as a "plug-in" for their operations.

Main findings

miniFlame is based on the same architectural platform as Flame. It can function as its own independent cyber espionage programme or as a component inside both Flame and Gauss. The cyber espionage tool operates as a backdoor designed for data theft and direct access to infected systems. Development of miniFlame might have started as early as 2007 and continued until the end of 2011. Many variations are presumed to be created. To date, Kaspersky Lab has identified six of these variants, covering two major generations, namely 4.x and 5.x.

Unlike Flame or Gauss, which had high number of infections, the amount of infections for miniFlame is much smaller. According to Kaspersky Lab's data, the number of infections is between ten and 20 machines. The total number of infections worldwide is estimated at 50-60. The number of infections combined with miniFlame's info-stealing features and flexible design indicate it was used for extremely targeted cyber-espionage operations, and was most likely deployed inside machines that were already infected by Flame or Gauss.

Discovered during analysis

The discovery of miniFlame occurred during the in-depth analysis of the Flame and Gauss malware. In July 2012 Kaspersky Lab's experts identified an additional module of Gauss, codenamed "John" and found references to the same module in Flame's configuration files. The subsequent analysis of Flame's command and control servers, conducted in September 2012, helped to reveal that the newly discovered module was in fact a separate malicious programme, although it can be used as a "plug-in" by both Gauss and Flame. miniFlame was codenamed SPE in the code of Flame's original C&C servers.

Kaspersky Lab discovered six different variations of miniFlame, all dating back to 2010/2011. At the same time, the analysis of miniFlame points to an even earlier date when development of the malware was commenced - not later than 2007. miniFlame's ability to be used as a plug-in by either Flame or Gauss clearly connects the collaboration between the development teams of both Flame and Gauss. Since the connection between Flame and Stuxnet/Duqu has already been revealed, it can be concluded that all these advanced threats come from the same "cyber warfare" factory.

Operating as a back door

The original infection vector of miniFlame is yet to be determined. Given the confirmed relationship between miniFlame, Flame, and Gauss, miniFlame may be installed on machines already infected by Flame or Gauss. Once installed, miniFlame operates as a back door and enables the malware operators to obtain any file from an infected machine. Additional info-stealing capabilities include making screenshots of an infected computer while it's running a specific programme or application in such as a web browser, Microsoft Office programme, Adobe Reader, instant messenger service, or an FTP client.

miniFlame uploads the stolen data by connecting to its C&C server (which may be unique, or shared with Flame's C&Cs). Separately, at the request from miniFlame's C&C operator, an additional data-stealing module can be sent to an infected system, which infects USB drives and uses them to store data that is collected from infected machines without an Internet connection.
LEGAL DISCLAIMER: This Message Board accepts no liability of legal consequences that arise from the Message Boards (e.g. defamation, slander, or other such crimes). All posted messages are the sole property of their respective authors. The maintainer does retain the right to remove any message posts for whatever reasons. People that post messages to this forum are not to libel/slander nor in any other way depict a company, entity, individual(s), or service in a false light; should they do so, the legal consequences are theirs alone. will disclose authors' IP addresses to authorities if compelled to do so by a court of law.