Flame, also known as Flamer, sKyWIper, and Skywiper, is modular computer
malware
Malware (a portmanteau for ''malicious software'') is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, de ...
discovered in 2012
that attacks computers running the
Microsoft Windows operating system.
[ The program is used for targeted ]cyber espionage
Cyber may refer to:
Computing and the Internet
* ''Cyber-'', from cybernetics, a transdisciplinary approach for exploring regulatory and purposive systems
Crime and security
* Cyber crime, crime that involves computers and networks
** Conven ...
in Middle East
The Middle East ( ar, الشرق الأوسط, ISO 233: ) is a geopolitical region commonly encompassing Arabia (including the Arabian Peninsula and Bahrain), Asia Minor (Asian part of Turkey except Hatay Province), East Thrace (Europ ...
ern countries.
Its discovery was announced on 28 May 2012 by the MAHER Center of the Iranian National Computer Emergency Response Team
A computer emergency response team (CERT) is an expert group that handles computer security incidents. Alternative names for such groups include computer emergency readiness team and computer security incident response team (CSIRT). A more modern ...
(CERT),[ ]Kaspersky Lab
Kaspersky Lab (; Russian language, Russian: Лаборатория Касперского, Romanization of Russian, tr. ''Laboratoriya Kasperskogo'') is a Russian Multinational corporation, multinational cybersecurity and anti-virus provider head ...
[ and CrySyS Lab of the ]Budapest University of Technology and Economics
The Budapest University of Technology and Economics ( hu, Budapesti Műszaki és Gazdaságtudományi Egyetem or in short ), official abbreviation BME, is the most significant university of technology in Hungary and is considered the world's olde ...
.[ The last of these stated in its report that Flame "is certainly the most sophisticated malware we encountered during our practice; arguably, it is the most complex malware ever found."][ Flame can spread to other systems over a local network (LAN). It can record audio, ]screenshot
screenshot (also known as screen capture or screen grab) is a digital image that shows the contents of a computer display. A screenshot is created by the operating system or software running on the device powering the display.
Additionally, s ...
s, keyboard activity and network traffic Network traffic or data traffic is the amount of data moving across a network at a given point of time. Network data in computer networks is mostly encapsulated in network packets, which provide the load in the network. Network traffic is the main ...
.[ The program also records ]Skype
Skype () is a proprietary telecommunications application operated by Skype Technologies, a division of Microsoft, best known for VoIP-based videotelephony, videoconferencing and voice calls. It also has instant messaging, file transfer, ...
conversations and can turn infected computers into Bluetooth
Bluetooth is a short-range wireless technology standard that is used for exchanging data between fixed and mobile devices over short distances and building personal area networks (PANs). In the most widely used mode, transmission power is limit ...
beacons which attempt to download contact information from nearby Bluetooth-enabled devices.[ This data, along with locally stored documents, is sent on to one of several ]command and control
Command and control (abbr. C2) is a "set of organizational and technical attributes and processes ... hatemploys human, physical, and information resources to solve problems and accomplish missions" to achieve the goals of an organization or e ...
servers that are scattered around the world. The program then awaits further instructions from these servers.[
According to estimates by Kaspersky in May 2012, Flame had initially infected approximately 1,000 machines,][ with victims including governmental organizations, educational institutions and private individuals.][ At that time 65% of the infections happened in Iran, Israel, Palestine, Sudan, Syria, Lebanon, Saudi Arabia, and Egypt,][ with a "huge majority of targets" within Iran.] Flame has also been reported in Europe and North America. Flame supports a "kill" command which wipes all traces of the malware from the computer. The initial infections of Flame stopped operating after its public exposure, and the "kill" command was sent.
Flame is linked to the Equation Group
The Equation Group, classified as an advanced persistent threat, is a highly sophisticated threat actor suspected of being tied to the Tailored Access Operations (TAO) unit of the United States National Security Agency (NSA). Kaspersky Labs des ...
by Kaspersky Lab. However, Costin Raiu, the director of Kaspersky Lab's global research and analysis team, believes the group only cooperates with the creators of Flame and Stuxnet
Stuxnet is a malicious computer worm first uncovered in 2010 and thought to have been in development since at least 2005. Stuxnet targets supervisory control and data acquisition ( SCADA) systems and is believed to be responsible for causing subs ...
from a position of superiority: "Equation Group are definitely the masters, and they are giving the others, maybe, bread crumbs. From time to time they are giving them some goodies to integrate into Stuxnet and Flame."
In 2019, researchers Juan Andres Guerrero-Saade and Silas Cutler announced their discovery of the resurgence of Flame. The attackers used 'timestomping' to make the new samples look like they were created before the 'suicide' command. However, a compilation error included the real compilation date (circa 2014). The new version (dubbed 'Flame 2.0' by the researchers) includes new encryption and obfuscation mechanisms to hide its functionality.
History
Flame (a.k.a. Da Flame) was identified in May 2012 by the MAHER Center of the Iranian National CERT, Kaspersky Lab and CrySyS Lab (Laboratory of Cryptography and System Security) of the Budapest University of Technology and Economics when Kaspersky Lab was asked by the United Nations International Telecommunication Union
The International Telecommunication Union is a specialized agency of the United Nations responsible for many matters related to information and communication technologies. It was established on 17 May 1865 as the International Telegraph Unio ...
to investigate reports of a virus affecting Iranian Oil Ministry
The Ministry of Petroleum (MOP) ( fa, وزارت نفت, Vezârat-e Naft) manages the oil industry, the producer of oil and petrochemical products. MoP is in charge of all issues pertaining to exploration, extraction, exploitation, distribution ...
computers. As Kaspersky Lab investigated, they discovered an MD5 hash and filename that appeared only on customer machines from Middle Eastern nations. After discovering more pieces, researchers dubbed the program "Flame" after one of the main modules inside the toolkit .[
According to Kaspersky, Flame had been operating in the wild since at least February 2010.][ CrySyS Lab reported that the file name of the main component was observed as early as December 2007.][ However, its creation date could not be determined directly, as the creation dates for the malware's modules are falsely set to dates as early as 1994.][
Computer experts consider it the cause of an attack in April 2012 that caused Iranian officials to disconnect their oil terminals from the Internet.] At the time the Iranian Students News Agency
The Iranian Students' News Agency (ISNA) is a news agency run by Iranian university students.
Position
It covers a variety of national and international topics.Engber, Daniel. What's With the Iranian Students News Agency?, ''Slate'', 2 Februa ...
referred to the malware that caused the attack as "Wiper", a name given to it by the malware's creator. However, Kaspersky Lab believes that Flame may be "a separate infection entirely" from the Wiper malware.[ Due to the size and complexity of the program—described as "twenty times" more complicated than ]Stuxnet
Stuxnet is a malicious computer worm first uncovered in 2010 and thought to have been in development since at least 2005. Stuxnet targets supervisory control and data acquisition ( SCADA) systems and is believed to be responsible for causing subs ...
—the Lab stated that a full analysis could require as long as ten years.[
On 28 May, Iran's CERT announced that it had developed a detection program and a removal tool for Flame, and had been distributing these to "select organizations" for several weeks.][ After Flame's exposure in news media, Symantec reported on 8 June that some Flame command and control (C&C) computers had sent a "suicide" command to infected PCs to remove all traces of Flame.]
According to estimates by Kaspersky in May 2012, initially Flame had infected approximately 1,000 machines,[ with victims including governmental organizations, educational institutions and private individuals.][ At that time the countries most affected were Iran, Israel, the Palestinian Territories, Sudan, Syria, Lebanon, Saudi Arabia, and Egypt.][
A sample of the Flame malware is available a]
GitHub
Operation
Flame is an uncharacteristically large program for malware at 20 megabyte
The megabyte is a multiple of the unit byte for digital information. Its recommended unit symbol is MB. The unit prefix ''mega'' is a multiplier of (106) in the International System of Units (SI). Therefore, one megabyte is one million bytes o ...
s. It is written partly in the Lua
Lua or LUA may refer to:
Science and technology
* Lua (programming language)
* Latvia University of Agriculture
* Last universal ancestor, in evolution
Ethnicity and language
* Lua people, of Laos
* Lawa people, of Thailand sometimes referred t ...
scripting language with compiled C++ code linked in, and allows other attack modules to be loaded after initial infection. The malware uses five different encryption methods and an SQLite
SQLite (, ) is a database engine written in the C programming language. It is not a standalone app; rather, it is a library that software developers embed in their apps. As such, it belongs to the family of embedded databases. It is the mo ...
database to store structured information.[ The method used to inject code into various processes is stealthy, in that the malware modules do not appear in a listing of the modules loaded into a process and malware memory pages are protected with READ, WRITE and EXECUTE permissions that make them inaccessible by user-mode applications.][ The internal code has few similarities with other malware, but exploits two of the same security vulnerabilities used previously by Stuxnet to infect systems.][ The malware determines what ]antivirus software
Antivirus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware.
Antivirus software was originally developed to detect and remove computer viruses, hence the name ...
is installed, then customises its own behaviour (for example, by changing the filename extension
A filename extension, file name extension or file extension is a suffix to the name of a computer file (e.g., .txt, .docx, .md). The extension indicates a characteristic of the file contents or its intended use. A filename extension is typically ...
s it uses) to reduce the probability of detection by that software.[ Additional indicators of compromise include ]mutex
In computer science, a lock or mutex (from mutual exclusion) is a synchronization primitive: a mechanism that enforces limits on access to a resource when there are many threads of execution. A lock is designed to enforce a mutual exclusion concu ...
and registry Registry may refer to:
Computing
* Container registry, an operating-system-level virtualization registry
* Domain name registry, a database of top-level internet domain names
* Local Internet registry
* Metadata registry, information system for re ...
activity, such as installation of a fake audio
Audio most commonly refers to sound, as it is transmitted in signal form. It may also refer to:
Sound
*Audio signal, an electrical representation of sound
*Audio frequency, a frequency in the audio spectrum
* Digital audio, representation of soun ...
driver which the malware uses to maintain persistence on the compromised system.[
Flame is not designed to deactivate automatically, but supports a "kill" function that makes it eliminate all traces of its files and operation from a system on receipt of a module from its controllers.][
Flame was signed with a fraudulent ]certificate
Certificate may refer to:
* Birth certificate
* Marriage certificate
* Death certificate
* Gift certificate
* Certificate of authenticity, a document or seal certifying the authenticity of something
* Certificate of deposit, or CD, a financial pr ...
purportedly from the Microsoft Enforced Licensing Intermediate PCA certificate authority. The malware authors identified a Microsoft Terminal Server
A terminal server connects devices with a serial port to a local area network (LAN). Products marketed as terminal servers can be very simple devices that do not offer any security functionality, such as data encryption and user authenticatio ...
Licensing Service certificate that inadvertently was enabled for code signing and that still used the weak MD5 hashing algorithm, then produced a counterfeit copy of the certificate that they used to sign
A sign is an Physical object, object, quality (philosophy), quality, event, or Non-physical entity, entity whose presence or occurrence indicates the probable presence or occurrence of something else. A natural sign bears a causal relation to ...
some components of the malware to make them appear to have originated from Microsoft. A successful collision attack
In cryptography, a collision attack on a cryptographic hash tries to find two inputs producing the same hash value, i.e. a hash collision. This is in contrast to a preimage attack where a specific target hash value is specified.
There are roug ...
against a certificate was previously demonstrated in 2008,
but Flame implemented a new variation of the chosen-prefix collision attack.
Deployment
Like the previously known cyber weapons Stuxnet
Stuxnet is a malicious computer worm first uncovered in 2010 and thought to have been in development since at least 2005. Stuxnet targets supervisory control and data acquisition ( SCADA) systems and is believed to be responsible for causing subs ...
and Duqu
Duqu is a collection of computer malware discovered on 1 September 2011, thought by Kaspersky Labs to be related to the Stuxnet worm and to have been created by Unit 8200. Duqu has exploited Microsoft Windows's zero-day vulnerability. The Labo ...
, it is employed in a targeted manner and can evade current security software through rootkit
A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the exis ...
functionality. Once a system is infected, Flame can spread to other systems over a local network or via USB stick. It can record audio, screenshots, keyboard activity and network traffic Network traffic or data traffic is the amount of data moving across a network at a given point of time. Network data in computer networks is mostly encapsulated in network packets, which provide the load in the network. Network traffic is the main ...
.[ The program also records Skype conversations and can turn infected computers into Bluetooth beacons which attempt to download contact information from nearby Bluetooth enabled devices.][ This data, along with locally stored documents, is sent on to one of several command and control servers that are scattered around the world. The program then awaits further instructions from these servers.][
Unlike Stuxnet, which was designed to ]sabotage
Sabotage is a deliberate action aimed at weakening a polity, effort, or organization through subversion, obstruction, disruption, or destruction. One who engages in sabotage is a ''saboteur''. Saboteurs typically try to conceal their identiti ...
an industrial process, Flame appears to have been written purely for espionage
Espionage, spying, or intelligence gathering is the act of obtaining secret or confidential information ( intelligence) from non-disclosed sources or divulging of the same without the permission of the holder of the information for a tang ...
. It does not appear to target a particular industry, but rather is "a complete attack toolkit designed for general cyber-espionage purposes".
Using a technique known as sinkholing, Kaspersky demonstrated that "a huge majority of targets" were within Iran, with the attackers particularly seeking AutoCAD
AutoCAD is a commercial computer-aided design (CAD) and drafting software application. Developed and marketed by Autodesk, AutoCAD was first released in December 1982 as a desktop app running on microcomputers with internal graphics controllers. ...
drawings, PDF
Portable Document Format (PDF), standardized as ISO 32000, is a file format developed by Adobe in 1992 to present documents, including text formatting and images, in a manner independent of application software, hardware, and operating systems. ...
s, and text file
A text file (sometimes spelled textfile; an old alternative name is flatfile) is a kind of computer file that is structured as a sequence of lines of electronic text. A text file exists stored as data within a computer file system. In operat ...
s. Computing experts said that the program appeared to be gathering technical diagrams for intelligence purposes.
A network of 80 servers across Asia, Europe and North America has been used to access the infected machines remotely.
Origin
On 19 June 2012, ''The Washington Post
''The Washington Post'' (also known as the ''Post'' and, informally, ''WaPo'') is an American daily newspaper published in Washington, D.C. It is the most widely circulated newspaper within the Washington metropolitan area and has a large n ...
'' published an article claiming that Flame was jointly developed by the U.S. National Security Agency
The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collectio ...
, CIA
The Central Intelligence Agency (CIA ), known informally as the Agency and historically as the Company, is a civilian foreign intelligence service of the federal government of the United States, officially tasked with gathering, processing, ...
and Israel's military at least five years prior. The project was said to be part of a classified effort code-named Olympic Games
The modern Olympic Games or Olympics (french: link=no, Jeux olympiques) are the leading international sporting events featuring summer and winter sports competitions in which thousands of athletes from around the world participate in a multi ...
, which was intended to collect intelligence in preparation for a cyber-sabotage campaign aimed at slowing Iranian nuclear efforts.
According to Kaspersky's chief malware expert, "the geography of the targets and also the complexity of the threat leaves no doubt about it being a nation-state that sponsored the research that went into it."[ Kaspersky initially said that the malware bears no resemblance to Stuxnet, although it may have been a parallel project commissioned by the same attackers.]
After analysing the code further, Kaspersky later said that there is a strong relationship between Flame and Stuxnet; the early version of Stuxnet contained code to propagate via USB drives that is nearly identical to a Flame module that exploits the same zero-day vulnerability
A zero-day (also known as a 0-day) is a computer-software vulnerability previously unknown to those who should be interested in its mitigation, like the vendor of the target software. Until the vulnerability is mitigated, hackers can exploit it t ...
.
Iran's CERT described the malware's encryption as having "a special pattern which you only see coming from Israel". ''The Daily Telegraph
''The Daily Telegraph'', known online and elsewhere as ''The Telegraph'', is a national British daily broadsheet newspaper published in London by Telegraph Media Group and distributed across the United Kingdom and internationally.
It was f ...
'' reported that due to Flame's apparent targets—which included Iran, Syria, and the West Bank
The West Bank ( ar, الضفة الغربية, translit=aḍ-Ḍiffah al-Ġarbiyyah; he, הגדה המערבית, translit=HaGadah HaMaʽaravit, also referred to by some Israelis as ) is a landlocked territory near the coast of the Mediter ...
—Israel became "many commentators' prime suspect". Other commentators named China and the U.S. as possible perpetrators.[ ]Richard Silverstein
Tikun Olam ( he, תיקון עולם ''tikkun olam'', "repairing the world") is a Seattle-based political blog that regularly reports on Israeli security matters. The blog was created in 2003 by Richard Silverstein and covers the Arab–Israeli c ...
, a commentator critical of Israeli policies, claimed that he had confirmed with a "senior Israeli source" that the malware was created by Israeli computer experts. ''The Jerusalem Post
''The Jerusalem Post'' is a broadsheet newspaper based in Jerusalem, founded in 1932 during the British Mandate of Palestine by Gershon Agron as ''The Palestine Post''. In 1950, it changed its name to ''The Jerusalem Post''. In 2004, the paper ...
'' wrote that Israel's Vice Prime Minister Moshe Ya'alon
Moshe "Bogie" Ya'alon ( he, משה יעלון; born Moshe Smilansky on 24 June 1950) is an Israeli politician and former Chief of Staff of the Israel Defense Forces, who also served as Israel's Defense Minister under Benjamin Netanyahu from 20 ...
appeared to have hinted that his government was responsible, but an Israeli spokesperson later denied that this had been implied. Unnamed Israeli security officials suggested that the infected machines found in Israel may imply that the virus could be traced to the U.S. or other Western nations. The U.S. has officially denied responsibility.
A leaked NSA document mentions that dealing with Iran's discovery of FLAME is an NSA and GCHQ
Government Communications Headquarters, commonly known as GCHQ, is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the Uni ...
jointly-worked event.
See also
* Cyber electronic warfare
Cyber may refer to:
Computing and the Internet
* ''Cyber-'', from cybernetics, a transdisciplinary approach for exploring regulatory and purposive systems
Crime and security
* Cyber crime, crime that involves computers and networks
** Conventi ...
* Cyber security standards
IT security standards or cyber security standards are techniques generally outlined in published materials that attempt to protect the cyber environment of a user or organization. This environment includes users themselves, networks, devices, all ...
* Cyberterrorism
Cyberterrorism is the use of the Internet to conduct violent acts that result in, or threaten, the loss of life or significant bodily harm, in order to achieve political or ideological gains through threat or intimidation. Acts of deliberate, la ...
* Operation High Roller
Notes
References
{{Malware
2012 in computing
Rootkits
Privilege escalation exploits
Cryptographic attacks
Cyberwarfare
Espionage scandals and incidents
Exploit-based worms
Cyberwarfare in Iran
Cyberattacks on energy sector
Spyware
Hacking in the 2010s