|Flame: massive malware infiltrating Iranian computers|
|By Thom Holwerda on 2012-05-28 23:32:03|
|"A massive, highly sophisticated piece of malware has been newly found infecting systems in Iran and elsewhere and is believed to be part of a well-coordinated, ongoing, state-run cyberespionage operation. The malware, discovered by Russia-based anti-virus firm Kaspersky Lab, is an espionage toolkit that has been infecting targeted systems in Iran, Lebanon, Syria, Sudan, the Israeli Occupied Territories and other countries in the Middle East and North Africa for at least two years. Dubbed 'Flame' by Kaspersky, the malicious code dwarfs Stuxnet in size." Since I'm not particularly well-versed in the subject, maybe someone can answer this question for me: if country A creates a malware infection like this to spy on and/or harm computers in country B, can it be construed as an act of war under existing international law?|
|Permalink for comment 519824|
To read all 44 comments associated with this story, please click here.
|Using the software of the enemy?|
|By on 2012-05-29 06:45:36|
> can it be construed as an act of war? |
From the article:
> Also, like Stuxnet, Flame has the ability to spread by infecting USB sticks using the autorun and .lnk vulnerabilities that Stuxnet used. It also uses the same print spooler vulnerability that Stuxnet used to spread to computers on a local network.
> The malware has the ability to infect a fully patched Windows 7 computer, which suggests that there may be a zero-day exploit in the code that the researchers have not yet found.
What was Iran thinking when they were using the software of the enemy?
How many (intentional or unintentional) "bugs" are left that allow remote control for computers in Iran?
|- Score: 3|
| · RE: Using the software of the enemy? by Loreia on 2012-05-29 09:35:43|
· RE: Using the software of the enemy? by Nth_Man on 2012-05-29 14:02:43