Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Security IT

Flame Malware Authors Hit Self-Destruct 260

angry tapir writes "The creators of the Flame cyber-espionage threat ordered infected computers still under their control to download and execute a component designed to remove all traces of the malware and prevent forensic analysis. Flame has a built-in feature called SUICIDE that can be used to uninstall the malware from infected computers. However, late last week, Flame's creators decided to distribute a different self-removal module to infected computers that connected to servers still under their control."
This discussion has been archived. No new comments can be posted.

Flame Malware Authors Hit Self-Destruct

Comments Filter:
  • Re:Nice try (Score:5, Informative)

    by Dunbal ( 464142 ) * on Thursday June 07, 2012 @10:28PM (#40252617)
    Er no, this is infected machines being remotely instructed to clean themselves up by the person controlling the "virus". It has nothing to do with you doing anything to your machine. They sent the virus an instruction, and the virus is removing all traces of itself from a machine.
  • by cheater512 ( 783349 ) <nick@nickstallman.net> on Thursday June 07, 2012 @10:50PM (#40252751) Homepage

    It overwrites with random data THEN deletes.

    Makes it impossible to tell it was ever installed.
    Otherwise you could scan the disk for remnants to tell if a computer was infected in the past.

    Delete doesn't actually remove any data, just the filename and allocates it as free space.

  • by cheater512 ( 783349 ) <nick@nickstallman.net> on Thursday June 07, 2012 @11:29PM (#40252985) Homepage

    Most certificates these days use SHA1 at the very least.

    This is not a issue for Linux anyway because Linux does not use certificates for code.
    Some do sign repositories, however those certificates are somewhat stronger.

    Remember, MD5 has been broken and deprecated for many years.

  • by mysidia ( 191772 ) on Thursday June 07, 2012 @11:51PM (#40253115)

    Journals are only so deep and, more importantly, only contain file metadata.

    True, but Volume shadow copy can retain past revisions of files for a considerable length of time. So can backup applications which store copies of files offline

  • by Anonymous Coward on Friday June 08, 2012 @12:08AM (#40253187)

    Journals are only so deep and, more importantly, only contain file metadata.

    This is true for most installations, but not in general. Some journaling filesystems (including ext3 and ext4) let you write all data through the journal as well -- it guarantees data integrity as well as filesystem consistency.

    Obviously, if the journal is on the filesystem device (internal journal, or external journal on another partition of the same disk (but WTF would you do that)), it costs you half your write bandwidth, which is why it's rarely used (though it can boost performance on fsync-heavy workloads, because it reduces seeking), but it can be effective with an external journal, or if the data integrity is worth the performance loss.

  • by viperidaenz ( 2515578 ) on Friday June 08, 2012 @12:20AM (#40253253)
    Many SSD's will write to empty blocks without erasing the original as the erase block size is much larger than the write block size. You don't want to have to read 15x more data and write it back just because you changed 16th of the erase block.
  • Re:Interesting (Score:2, Informative)

    by Anonymous Coward on Friday June 08, 2012 @12:42AM (#40253353)

    Second, since when is Pakistan not in the Middle East?

    Pakistan is in South Asia. Consider, for example, their membership in the SAARC.

    https://en.wikipedia.org/wiki/South_Asian_Association_for_Regional_Cooperation#Current_members

    They _want_ to be considered as a Middle East, or more accurately, an Arab country. There are "scholars" in Pakistan producing academic papers "proving" that Pakistanis are descended from Arabs. Not only does this ignore the complex interplay of ethnicities present in the Indian sub-continent, it is pure political revisionism to disown their shared ancestry with Indians, so that the creation of Pakistan on religious grounds gains justification.

    BTW, "Indian" subcontinent is also not a term preferred in Pakistani discourse. South Asia is more acceptable.

  • by Anonymous Coward on Friday June 08, 2012 @01:24AM (#40253575)

    Heckler und Koch GmbH and Rheinmetal AG have licensed factories in Iran.

    Not quite correct: there were factories in Iran producing those weapons under license, since the early 1970s. Not H&K factories. The Iranians originally paid a royalty on each item produced.

    Are you also going to be indignant that Bell provided critical assistance in establishing the helicopter repair and production facility at Isfahan in the same period?

  • by Anonymous Coward on Friday June 08, 2012 @03:22AM (#40254027)

    As someone who works in the ITAD industry SSDs are causing an absolute shit-fit to put it lightly. No, it is not possibly to reliably overwrite any given file on an SSD. The obfuscation layer makes it impossible to do perform a true full overwrite and even harder to verify.

    Sadly even formatting the whole thing is ineffective if you want to be sure that 100% of data is overwritten. SSDs have 10-30% more blocks than they let on, and the drive chooses which ones it's telling you about. If you write one day and wipe another your guess is as good as mine where the data was saved, what the software tried to overwrite, and what any effort to verify is reading. All three could be different.

  • by Henk Poley ( 308046 ) on Friday June 08, 2012 @04:07AM (#40254207) Homepage

    A format is not enough. You have to do a ATA Secure Erase to be really sure. But, a format or full empty space overwrite should make sure somebody will have to disassemble the drive to actually get to the data remnants. Since the visible virtualized drive part will of course remain empty, else the 'contract' of storage would be broken.

  • by Anonymous Coward on Friday June 08, 2012 @06:09AM (#40254677)
    Actually, yes - my Mac does it automatically [apple.com].
  • by chrb ( 1083577 ) on Friday June 08, 2012 @06:15AM (#40254697)

    Except when stuff like this comes out: http://freecode.com/articles/ubuntu-new-apt-packages-fix-security-vulnerabilities-3 [freecode.com] [freecode.com]

    Ubuntu bug: Bug reported 22nd September and closed the same day [launchpad.net].

    Microsoft bug: attacks on MD5 widely known and carried out since 2005, [schneier.com] but Microsoft still carry on using it in Windows Update until 2012.

    No one should dismiss the likelihood of rogus developers submitting changes to key components of popular distros like Ubuntu to exploit. Combined with a MITM attack, your Ubuntu system is owned. This is one reason I no longer use Ubuntu.

    Do you have any evidence that this was the action of a rogue developer? By your logic, you must no longer use a computer, as the "rogue" developer issue is one that potentially affects all software.

2.4 statute miles of surgical tubing at Yale U. = 1 I.V.League

Working...