{"id":229,"date":"2012-10-18T20:00:11","date_gmt":"2012-10-18T20:00:11","guid":{"rendered":""},"modified":"2017-04-19T20:16:47","modified_gmt":"2017-04-19T20:16:47","slug":"meet-flame-espionage-malware-cousin-miniflame","status":"publish","type":"post","link":"https:\/\/erii.org\/dev\/meet-flame-espionage-malware-cousin-miniflame\/","title":{"rendered":"Meet Flame Espionage Malware Cousin: MiniFlame"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_text_separator title=&#8221;Meet Flame Espionage Malware Cousin: MiniFlame&#8221; title_align=&#8221;separator_align_left&#8221; align=&#8221;align_left&#8221; color=&#8221;custom&#8221; border_width=&#8221;2&#8243; accent_color=&#8221;#c99d41&#8243;][vc_column_text]<\/p>\n<div class=\"field_blog_text\">\n<div>\n<p><strong>Suspected Flame module turns out to be standalone attack code in use since at least 2010, described as targeted cyberweapon for conducting in-depth surveillance and espionage.<\/strong><\/p>\n<p class=\"firstP\">Ongoing teardowns of the Flame malware and its underlying components have yielded a surprising discovery: a new piece of malware.<\/p>\n<p>Security researchers at Kaspersky Lab said that what they previously suspected was an&nbsp;attack module&nbsp;for the Flame malware is instead a standalone piece of attack code, although it can do double duty as a plug-in for both the Flame and Gauss malware. Designed for data theft and for providing attackers with direct access to an infected system, MiniFlame is based on the same architectural platform as Flame, according to Kaspersky Lab.<\/p>\n<p><span>&#8220;MiniFlame is a high-precision attack tool,&#8221; said Alexander Gostev, chief security expert at Kaspersky Lab, in an emailed statement. &#8220;Most likely it is a targeted cyberweapon used in what can be defined as the second wave of a cyberattack &#8230; to conduct more in-depth surveillance and cyber-espionage.&#8221;<\/span><\/p>\n<p><a href=\"http:\/\/www.informationweek.com\/security\/vulnerabilities\/meet-flame-espionage-malware-cousin-mini\/240009131\" target=\"_blank\"><\/p>\n<p><span>More here: http:\/\/www.informationweek.com\/security\/vulnerabilities\/meet-flame-espionage-malware-cousin-mini\/240009131<\/span><\/p>\n<p><\/a>\n<\/div>\n<p>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_text_separator title=&#8221;Meet Flame Espionage Malware Cousin: MiniFlame&#8221; title_align=&#8221;separator_align_left&#8221; align=&#8221;align_left&#8221; color=&#8221;custom&#8221; border_width=&#8221;2&#8243; accent_color=&#8221;#c99d41&#8243;][vc_column_text] Suspected Flame module turns out to be standalone attack code in use since at least 2010, described as targeted cyberweapon for conducting in-depth surveillance and espionage. Ongoing teardowns of the Flame malware and its underlying components have yielded a surprising discovery: a new piece of malware. Security researchers at Kaspersky Lab said that what they previously suspected was an&nbsp;attack module&nbsp;for the Flame malware is instead a standalone piece of attack code, although it can do double duty as a plug-in for both the Flame and Gauss malware. Designed for data theft and for providing attackers with direct access to an infected system, MiniFlame is based on the same architectural platform as Flame, according to Kaspersky Lab. &#8220;MiniFlame is a high-precision attack tool,&#8221; said Alexander Gostev, chief security expert at Kaspersky Lab,&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0},"categories":[4,3,5,2],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.8 (Yoast SEO v20.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Meet Flame Espionage Malware Cousin: MiniFlame - ERII<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/erii.org\/dev\/meet-flame-espionage-malware-cousin-miniflame\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Meet Flame Espionage Malware Cousin: MiniFlame\" \/>\n<meta property=\"og:description\" content=\"[vc_row][vc_column][vc_text_separator title=&#8221;Meet Flame Espionage Malware Cousin: MiniFlame&#8221; title_align=&#8221;separator_align_left&#8221; align=&#8221;align_left&#8221; color=&#8221;custom&#8221; border_width=&#8221;2&#8243; accent_color=&#8221;#c99d41&#8243;][vc_column_text] Suspected Flame module turns out to be standalone attack code in use since at least 2010, described as targeted cyberweapon for conducting in-depth surveillance and espionage. Ongoing teardowns of the Flame malware and its underlying components have yielded a surprising discovery: a new piece of malware. Security researchers at Kaspersky Lab said that what they previously suspected was an&nbsp;attack module&nbsp;for the Flame malware is instead a standalone piece of attack code, although it can do double duty as a plug-in for both the Flame and Gauss malware. Designed for data theft and for providing attackers with direct access to an infected system, MiniFlame is based on the same architectural platform as Flame, according to Kaspersky Lab. &#8220;MiniFlame is a high-precision attack tool,&#8221; said Alexander Gostev, chief security expert at Kaspersky Lab,...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/erii.org\/dev\/meet-flame-espionage-malware-cousin-miniflame\/\" \/>\n<meta property=\"og:site_name\" content=\"ERII\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EspionageResearchInstitute\/\" \/>\n<meta property=\"article:published_time\" content=\"2012-10-18T20:00:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-04-19T20:16:47+00:00\" \/>\n<meta name=\"author\" content=\"jdleasure\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ERIINTL\" \/>\n<meta name=\"twitter:site\" content=\"@ERIINTL\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"jdleasure\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/erii.org\/dev\/meet-flame-espionage-malware-cousin-miniflame\/\",\"url\":\"https:\/\/erii.org\/dev\/meet-flame-espionage-malware-cousin-miniflame\/\",\"name\":\"Meet Flame Espionage Malware Cousin: MiniFlame - ERII\",\"isPartOf\":{\"@id\":\"https:\/\/erii.org\/dev\/#website\"},\"datePublished\":\"2012-10-18T20:00:11+00:00\",\"dateModified\":\"2017-04-19T20:16:47+00:00\",\"author\":{\"@id\":\"https:\/\/erii.org\/dev\/#\/schema\/person\/f7cca9f4ba574a52c8a485850e918c0d\"},\"breadcrumb\":{\"@id\":\"https:\/\/erii.org\/dev\/meet-flame-espionage-malware-cousin-miniflame\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/erii.org\/dev\/meet-flame-espionage-malware-cousin-miniflame\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/erii.org\/dev\/meet-flame-espionage-malware-cousin-miniflame\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/erii.org\/dev\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Meet Flame Espionage Malware Cousin: MiniFlame\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/erii.org\/dev\/#website\",\"url\":\"https:\/\/erii.org\/dev\/\",\"name\":\"ERII\",\"description\":\"Espionage Research Institute International\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/erii.org\/dev\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/erii.org\/dev\/#\/schema\/person\/f7cca9f4ba574a52c8a485850e918c0d\",\"name\":\"jdleasure\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/erii.org\/dev\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3908f46ef32fbfbaca9850ad774bbd00?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3908f46ef32fbfbaca9850ad774bbd00?s=96&d=mm&r=g\",\"caption\":\"jdleasure\"},\"url\":\"https:\/\/erii.org\/dev\/author\/jdleasure\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Meet Flame Espionage Malware Cousin: MiniFlame - ERII","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/erii.org\/dev\/meet-flame-espionage-malware-cousin-miniflame\/","og_locale":"en_US","og_type":"article","og_title":"Meet Flame Espionage Malware Cousin: MiniFlame","og_description":"[vc_row][vc_column][vc_text_separator title=&#8221;Meet Flame Espionage Malware Cousin: MiniFlame&#8221; title_align=&#8221;separator_align_left&#8221; align=&#8221;align_left&#8221; color=&#8221;custom&#8221; border_width=&#8221;2&#8243; accent_color=&#8221;#c99d41&#8243;][vc_column_text] Suspected Flame module turns out to be standalone attack code in use since at least 2010, described as targeted cyberweapon for conducting in-depth surveillance and espionage. Ongoing teardowns of the Flame malware and its underlying components have yielded a surprising discovery: a new piece of malware. Security researchers at Kaspersky Lab said that what they previously suspected was an&nbsp;attack module&nbsp;for the Flame malware is instead a standalone piece of attack code, although it can do double duty as a plug-in for both the Flame and Gauss malware. Designed for data theft and for providing attackers with direct access to an infected system, MiniFlame is based on the same architectural platform as Flame, according to Kaspersky Lab. &#8220;MiniFlame is a high-precision attack tool,&#8221; said Alexander Gostev, chief security expert at Kaspersky Lab,...","og_url":"https:\/\/erii.org\/dev\/meet-flame-espionage-malware-cousin-miniflame\/","og_site_name":"ERII","article_publisher":"https:\/\/www.facebook.com\/EspionageResearchInstitute\/","article_published_time":"2012-10-18T20:00:11+00:00","article_modified_time":"2017-04-19T20:16:47+00:00","author":"jdleasure","twitter_card":"summary_large_image","twitter_creator":"@ERIINTL","twitter_site":"@ERIINTL","twitter_misc":{"Written by":"jdleasure","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/erii.org\/dev\/meet-flame-espionage-malware-cousin-miniflame\/","url":"https:\/\/erii.org\/dev\/meet-flame-espionage-malware-cousin-miniflame\/","name":"Meet Flame Espionage Malware Cousin: MiniFlame - ERII","isPartOf":{"@id":"https:\/\/erii.org\/dev\/#website"},"datePublished":"2012-10-18T20:00:11+00:00","dateModified":"2017-04-19T20:16:47+00:00","author":{"@id":"https:\/\/erii.org\/dev\/#\/schema\/person\/f7cca9f4ba574a52c8a485850e918c0d"},"breadcrumb":{"@id":"https:\/\/erii.org\/dev\/meet-flame-espionage-malware-cousin-miniflame\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/erii.org\/dev\/meet-flame-espionage-malware-cousin-miniflame\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/erii.org\/dev\/meet-flame-espionage-malware-cousin-miniflame\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/erii.org\/dev\/"},{"@type":"ListItem","position":2,"name":"Meet Flame Espionage Malware Cousin: MiniFlame"}]},{"@type":"WebSite","@id":"https:\/\/erii.org\/dev\/#website","url":"https:\/\/erii.org\/dev\/","name":"ERII","description":"Espionage Research Institute International","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/erii.org\/dev\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/erii.org\/dev\/#\/schema\/person\/f7cca9f4ba574a52c8a485850e918c0d","name":"jdleasure","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/erii.org\/dev\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3908f46ef32fbfbaca9850ad774bbd00?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3908f46ef32fbfbaca9850ad774bbd00?s=96&d=mm&r=g","caption":"jdleasure"},"url":"https:\/\/erii.org\/dev\/author\/jdleasure\/"}]}},"_links":{"self":[{"href":"https:\/\/erii.org\/dev\/wp-json\/wp\/v2\/posts\/229"}],"collection":[{"href":"https:\/\/erii.org\/dev\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/erii.org\/dev\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/erii.org\/dev\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/erii.org\/dev\/wp-json\/wp\/v2\/comments?post=229"}],"version-history":[{"count":5,"href":"https:\/\/erii.org\/dev\/wp-json\/wp\/v2\/posts\/229\/revisions"}],"predecessor-version":[{"id":2760,"href":"https:\/\/erii.org\/dev\/wp-json\/wp\/v2\/posts\/229\/revisions\/2760"}],"wp:attachment":[{"href":"https:\/\/erii.org\/dev\/wp-json\/wp\/v2\/media?parent=229"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/erii.org\/dev\/wp-json\/wp\/v2\/categories?post=229"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/erii.org\/dev\/wp-json\/wp\/v2\/tags?post=229"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}