News Brief: Flame Worm
On Monday, 28.5.12 a new worm, known as Flame and Skywiper, was discovered as being prominent in the Middle East. This is the first document by Comsec Consulting which describes the abilities of the newly-discovered worm, as well as ways to check if the worm has infected your environment.
The worm gathers data from the computer using different methods:
a. Key Logging – saving the key strokes.
b. Taking screenshots.
c. Activating the microphone and setting to record.
d. Gathering information from documents and images on the computer.
The worm spreads itself via several infection vectors:
- Using existing exploits (MS10-061 and MS-10-041).
- Using user credentials to attack other computers.
- Spreading through removable media devices (such as USB).
- There is also an unverified assumption that the worm uses 0-day exploits.
Identifying the Worm
1. Registry – The worm uses the LSA Authentication Packages method for start-up. As a result, the data mssecmgr is added to the following registry key:
2. Files – The worm uses several files. The existence of each might indicate the presence of the worm. The file extension could be either ocx or sys:
3. Network - The worm communicates by browsing to Command and Control servers that are on the web. At this time there is no published address or domain list. However, if there has been a request to one of the following URLs: wp-content/rss.php or cgi-big/counter.cgi, one can conclude that an infection is present. Please note that the absence of this pattern is not evidence that the worm does not exist on your network.
- Use the HOST signature as described above in order to allocate the existence of the worm in the network.
- Update all computers in the network with Microsoft patches, in Particular MS10-061 and MS10-046 which are known ways for the worm to spread itself.
- Should you identify the worm on your network, it is recommended to initiate your organisation’s internal procedure to identify, isolate, and mitigate against the threat and make an assessment of the damage.
Symantec : http://www.symantec.com/connect/blogs/flamer-highly-sophisticated-and-discreet-threat-targets-middle-east
CrySys Lab: http://www.crysys.hu/skywiper/skywiper.pdf