flame-virus-AFP-670
This undated screen grab taken released by the Kaspersky Lab site shows a program of the computer virus known as Flame. — AFP Photo

WASHINGTON, Oct 15, 2012 (AFP) - A new cyber espionage tool linked to the Flame virus has been infecting computers in Lebanon, Iran and elsewhere, security researchers said Monday.

Kaspersky Lab, which was credited with revealing the Flame virus earlier this year, dubbed the new malware “miniFlame,” and said it was “a small and highly flexible malicious program designed to steal data and control infected systems during targeted cyber espionage operations.”

Russian-based Kaspersky said miniFlame “is based on the same architectural platform as Flame,” widely reported to be part of a US-Israeli effort to slow Iran's suspected nuclear weapons drive.

The smaller version “can function as its own independent cyber espionage program or as a component” inside Flame and related malware.

Unlike Flame, which is designed for “massive spy operations,” miniFlame is “a high precision, surgical attack tool,” according to Alexander Gostev at Kaspersky Lab.

“Most likely it is a targeted cyber weapon used in what can be defined as the second wave of a cyber attack.”Kaspersky Lab data indicates the total number of infections worldwide is just 50 to 60, including computers in Lebanon, France, the United States, Iran and Lithuania. ”

MiniFlame operates “as a backdoor designed for data theft and direct access to infected systems,” according to Kaspersky, which said development of the malware might have started as early as 2007 and continued until the end of 2011, with several variations.

“We believe that the developers of miniFlame created dozens of different modifications of the program,” Kaspersky said. “At this time, we have only found six of these, dated 2010-2011.”Flame previously has been linked to Stuxnet, which attacked computer control systems made by German industrial giant Siemens used to manage water supplies, oil rigs, power plants and other critical infrastructure.

Most Stuxnet infections have been discovered in Iran, giving rise to speculation it was intended to sabotage nuclear facilities there. The worm was crafted to recognize the system it was to attack.

Some reports say US and Israeli intelligence services collaborated to develop the computer worm to sabotage Iran's efforts to make a nuclear bomb.

Opinion

In defamation’s name

In defamation’s name

It provides yet more proof that the undergirding logic of public authority in Pakistan is legal and extra-legal coercion rather than legitimised consent.

Editorial

Mercury rising
Updated 27 May, 2024

Mercury rising

Each of the country's leaders is equally responsible for the deep pit Pakistan seems to have fallen into.
Antibiotic overuse
27 May, 2024

Antibiotic overuse

ANTIMICROBIAL resistance is an escalating crisis claiming some 700,000 lives annually in Pakistan. It is the third...
World Cup team
27 May, 2024

World Cup team

PAKISTAN waited until the very end to name their T20 World Cup squad. Even then, there was last-minute drama. Four...
ICJ rebuke
Updated 26 May, 2024

ICJ rebuke

The reason for Israel’s criminal behaviour is that it is protected by its powerful Western friends.
Hot spells
26 May, 2024

Hot spells

WITH Pakistan already dealing with a heatwave that has affected 26 districts since May 21, word from the climate...
Defiant stance
26 May, 2024

Defiant stance

AT a time when the country is in talks with the IMF for a medium-term loan crucial to bolstering the fragile ...