Skip to main content

Kaspersky: Cyberweapons Flame and Stuxnet share code

Flame malware / cyberweapon

When word of the sophisticated Flame cyberweapon first came out a couple weeks ago, Russian security firm Kaspersky indicated that despite some superficial similarities, there was no indication Flame had much of anything in common with Stuxnet, a software weapon that specifically targeted Iran’s uranium-enrichment efforts and then escaped into the wild. Now, Kaspersky says it was wrong: The firm claims to have uncovered shared code that indicate the creators of Flame and Stuxnet at least worked together — and may even be the same people.

Flame has attracted considerable attention in security circles for its sophisticated architecture the enables attackers to install modules tailored to their interest in a particular systems. Various modules appear to perform “normal” malware tasks like scanning through users’ files and logging keystrokes; Flame modules have also been found that appear to take screenshots, turn on audio microphones to record audio, and even poll nearby Bluetooth devices for contacts and other information.

Related Videos

The evidence? Back when Stuxnet was roaming free, Kaspersky’s automated systems picked up on something that looked like a Stuxnet variant. When Kaspersky’s staff initially looked at it, they couldn’t really understand why their systems thought it was Stuxnet, assumed it was an error, and reclassified it under the name “Tocy.a.” When Flame, appeared, however, Kaspersky went back to look for things that might link Flame to Stuxnet — and, lo and behold, there the Tocy.a variant that didn’t make any sense. In light of Flame, Kaspsersky says Tocy.a actually makes more sense: it’s an early version of a plug-in module for Flame that implements what (at the time) was a zero-day privilege escalation exploit in Windows. Tocy.a wandered into Kaspersky’s systems all the way back in October 2010, and contains code that can be traced to 2009.

“We think it’s actually possible to talk about a ‘Flame’ platform, and that this particular module was created based on its source code,” wrote Kaspersky’s Alexander Gostev.

If Kaspersky’s analysis is correct, it would indicate the “Flame platform” was already up and running by the time the original Stuxnet was created and set loose back in early-to-mid 2009. The approximate dating is possible because the proto-Flame code only appears in the first version of the Stuxnet worm: It vanished from two subsequent versions of Stuxnet that appeared in 2010.

Kaspersky infers that the highly-modular Flame platform proceeded on a different development path from Stuxnet, meaning there were at least two development teams involved. But the present of that early version of a Flame module seems to indicate the Stuxnet developers had access to source code for a true zero-day Windows exploit that was (at that point) unknown to the broader security community. That means the two teams were pretty tight, at least at one point.

The New York Times has reported that Stuxnet was created as a cyberweapon by the United States and Israel in an effort to hample Iran’s uranium enrichment activities. Since the discovery of Flame and its subsequent analysis by computer security firms, Flame’s creators have apparently sent a “suicide” command to some Flame-infected systems in an effort to remove traces of the software.

Editors' Recommendations

Your Windows 11 screenshots may not be as private as you thought
Person sitting and using an HP computer with Windows 11.

When you capture a screenshot and crop out sensitive information, it's still possible to recover a portion of the image that was supposedly removed in some circumstances.

This isn't the first time redacted documents have turned out to have left hidden data intact and readable with the right tools and knowledge. A recent bug in Google's Markup tool for the Pixel phone, humorously dubbed the "Acropalypse," shows this issue might be surprisingly common.

Read more
Best VPN services 2023: today’s top picks
best VPN services

People around the world use the internet for everything today, including work, education, shopping, socializing, and managing finances. It goes without saying, then, that ensuring your online privacy is more pressing than ever. Even if you lack technical skills, there's an affordable and easy security solution: a virtual private network, better known as a VPN. By using a good VPN, you can protect your devices and hide your online activities from cyber-criminals, network snoops, online busybodies, institutional censors, and other unwanted pests. But with so many options available, it can be challenging to choose the right VPN for your needs and budget. To help you make an informed decision and maybe even save you some money, we've curated a comprehensive list of the best VPN services complete with details on their pricing, features, and more.
Best VPN 2023

NordVPN
ExpressVPN
Surfshark
IPVanish
AtlasVPN
Hotspot Shield
PrivadoVPN
CyberGhost
PureVPN
TunnelBear
Private Internet Access
Kaspersky VPN

Read more
Adobe Firefly brings text-to-image AI to the masses, with artist ethics in mind
AI-generated imagery in Nvidia's press photo for AI Foundations.

Adobe Firefly was announced today by Adobe, as the company attempts to capitalize on the surge in interest in generative AI. The text-to-image model is only in beta, but will be coming first to Adobe Express, the company's simplest and most user-friendly application.

The set of tools will function a lot like many of the other popular text-to-image models, such as Stable Diffusion or Midjourney. The difference here, however, is that Firefly is built from the ground up by Adobe to be used within its creative applications. That means Firefly will be both highly accessible to beginners and include important ethical considerations for artists.

Read more