Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


03:16 PM
Connect Directly

How Flame Hid In Plain Sight For Years

Easy-to-crack encryption likely helped keep Flame alive, as well as its resemblance to conventional software

One of the most striking aspects about the newly discovered Flame malware kit is its ordinary appearance -- which is what helped make it so elusive for years.

As security researchers dig deeper into the massive lines of code that make up this targeted attack threat discovered this month, the fact that this dangerous cyberespionage kit evaded security controls for so long demonstrates how its similar structure to a commercial software program and its use of off-the-shelf techniques, such as SSL, SSH, and a SQL database, helped it blend in with other application traffic.

Flame has been around for a minimum of two-plus years, and up to eight years, according to some new analysis. It was highly targeted, infecting no more than 1,000 users, mostly in Iran, but also a few infections in other parts of the Middle East, Africa, and Hungary. And it's basically a virtual, digitized spy tool that does what a human spy would do: recording phone calls, snapping photos, and siphoning information.

Given that the majority of its targets were computers in Iran, where pirated software is rampant, it was likely easy for the attacks to bypass security controls, if there were any at all, experts say. "It was probably put on systems that don't have antivirus or was bypassing AV in a direct attack," says Stephen Cobb, security evangelist for ESET. Flame looks a lot like a normal software program, with standard libraries and unremarkable traffic. Actions such as turning on the computer's microphone for recording voice calls and meetings wouldn't necessarily raise suspicion, for instance, security experts say.

Lance James, director of intelligence at Vigilant, considers Flame the most complicated piece of malware ever written. But features such as Flame's encryption are simplified in order to remain under the radar, he says. "My theory is that they were not designed to be unbreakable encryption," James says. Flame contains five encryption ciphers, most of which are easily cracked, he adds.

That's not typical of malware. Most sophisticated malware employs stronger encryption, but the trade-off for the attacker is that its traffic can trigger a red flag at the network layer. "Entropy and complexity is used by most [malware developers]," James says. "In the world of encryption detection of malware at the network layer ... you watch the traffic generated by it and if the measure of randomness/entropy is high," that could be a sign of malware with crypto, he says.

Flame's creators either used easily cracked encryption to camouflage the attack, or it could be a function of the size of the overall code, he says. "They didn't want you to detect that they were hiding anything. They wanted to look like common data," James says. "It did the opposite of what everyone is expecting with malware. And that's what helped it stay undetected for so long."

Then there's the issue of trade sanctions against Iran. The U.S. and other nations are banned from selling certain technology to Iran, including antivirus software. So if users there pirated versions, they aren't likely getting security updates, experts say.

"These regions tend to perform more poorly than the average on an AV solution deployment," says Gunter Ollmann, vice president of research at Damballa. "I'm sure one of the criteria [in an attack] was whether or not there were security products on the targeted device and if it's capable of detecting [Flame's] bag of tricks."

But what worries security experts most is what the next version of Flame will do. Now that the cat's out of the bag, its developers could create new versions, and copycats could emerge. "It's a framework. I wouldn't be surprised to see it going around again," James says. "It's designed like a software house would do."

Francis Cianfrocca, founder and CEO of Bayshore Networks, says there are possibly dozens of precursors and descendants of Flame at large that haven't been detected because they haven't triggered any alarms. And it's a platform that could be used for any type of targeted advanced persistent threat (APT)-type attack, which should worry businesses in the U.S., too.

[ With conventional wisdom now that 'advanced attacks happen,' has the time come to create the next-generation sandbox or other containment method? See Advanced Attacks Call For New Defenses. ]

"With an APT, the value of having a platform like Flame is that it appears to be a platform. It looks to have the novel ability of controlling the I/O on an endpoint by taking over Bluetooth" and other features, Cianfrocca says. "It's the perfect thing if you want to eavesdrop on someone directly."

What's more worrisome is the ability of another version of Flame that could launch attacks within a corporation, he says. "This is a platform constructed in a sophisticated way to allow more than one kind of attack," he says.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio


Recommended Reading:

Comment  | 
Print  | 
More Insights
Oldest First  |  Newest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/2/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-07-02
Apache Guacamole 1.1.0 and older may mishandle pointers involved inprocessing data received via RDP static virtual channels. If a userconnects to a malicious or compromised RDP server, a series ofspecially-crafted PDUs could result in memory corruption, possiblyallowing arbitrary code to be executed...
PUBLISHED: 2020-07-02
A vulnerability in the web-based management interface of Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition, Cisco Unified Communications Manager IM & Presence Service, and Cisco Unity Connection could allow an unauthenticated, remote attack...
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, when users run the command displayed in NGINX Controller user interface (UI) to fetch the agent installer, the server TLS certificate is not verified.
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the Neural Autonomic Transport System (NATS) messaging services in use by the NGINX Controller do not require any form of authentication, so any successful connection would be authorized.
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller installer starts the download of Kubernetes packages from an HTTP URL On Debian/Ubuntu system.