The last time I checked with Google News this morning there were over 19,100,000 results for "flame malware". You may have heard many stories this week about this complex trojan. Here are links to three of my current personal favorite articles on "Flame".
- Powerful ‘Flame’ cyberweapon tied to popular Angry Birds game - (Fox News)
- Behind the 'Flame' malware spying on Mideast computers (FAQ) - (CNET)
- Flame Malware's Ties To Stuxnet, Duqu: Details Emerge - (InformationWeek)
Malware such as the recent “Flame” shows how cyberespionage and digital attacks have evolved. In years past, the malware developers would create code that would spread far and wide and infect any and all computers in it’s path.
Today, the Flame malware code is both highly targeted, and carefully crafted to remain undetected. The summary of this threat is that the Flame malware was focused on gathering, collecting and sending data, stealing information and intelligence on computer systems centered in the Middle East.
Our own Malware Intelligence Lead, Adam Kujawa spent considerable time looking into how the Flame malware differs from the recent Stuxnet and Duqu threats and includes a summary of public threats to be concerned about, namely Remote Administration Tools/Trojans (RATs) including a throwback mention of Poison Ivy for good measure. I would encourage you to check out his detailed and informative post here: /blog/intelligence/2012/06/rats-of-unusual-sizes/.