There are a lot of technical descriptions of the newly discovered Flame malware. (The most interesting one is here.) To understand Flame in a nutshell, here’s the best overview:
Once a system is infected, Flame begins a complex set of operations, including sniffing the network traffic, taking screenshots, recording audio conversations, intercepting the keyboard, and so on. All this data is available to the operators through the link to Flame’s command-and-control servers.
Lots of people are asking “What does Flame do?” The more important question, however, as the era of cyber war continues to evolve, is “What does Flame mean?” Flame, in fact, shows just how far and fast we’ve come along in cyber war. In the “old days” we saw the simple use of DDoS when Russia attacked Estonia in April of 2007. Just five years later, Flame shows the world that cyber war has evolved into something stealthier, more effective and a serious part of a military strategy. To borrow Andy Grove’s phrase, we’ve hit an inflection point. Consider:
Laisser un commentaire