E-spy program to impede the giant nuclear

E-spy program to impede the giant nuclear

19-09-2012 03:00 PM

Discovered specialists a new program aimed at Iran, which revealed major expansion of spying on Tehran to block the development of the nuclear program. has stunned experts who specialize in matters of digital technology when they discovered virus ‘flim’ mail, where he was the basis for the largest campaign spy electronic targeting Iran. However, it became clear now, it seems, that this virus is just the tip of the iceberg. announced observers specialize in things digital Bashrkian working in the field of anti-virus are ‘Kaspersky and Symantec’ for new discoveries from behind the dismantling of the electronic parts of a program called Flim, as revealed thus the existence of a spy electronic expanded directed at what appears to be the Islamic Republic of Iran. claimed media reports already that the United States and Israel already have that fired virus ‘Stoxnt’ – which was described as a first weapon mail to be launched in the world – in order to slow progress made by Iran in terms of its nuclear program, and spyware-mail the other three, including the flim, were part of the same process. has revealed new analysis now for the presence of traces of at least three other malicious programs targeting Iran, suggesting that what there are still a large number of programs that have not yet discovered the spying on Iranian computers. She drew the Christian Science Monitor U.S. to the presence of new indicators also show that a huge harvest. cited in this connection, for Alexander Gostev, chief security sector Kaspersky Labs, saying ‘is characterized by flim developers Pettmisahm to hide their tracks. There is, however, an error has occurred on the part of the perpetrators of the attack may have helped to discover more data ‘. newspaper added that evidence was found in European servants have been designed to avoid detection from providers receptions through named Hamid, a ‘Newsforyou’. Software error has left behind him an encrypted file data and a special register. analysis of the data showed that the servants were able to receive data from infected machines using four different protocols, and did not ‘Flame’ is only one of them. The Kaspersky ‘The presence of three additional protocols not used by the flim provides evidence that three other malicious programs linked Pflam at least have been developed.’ paper went transported John Bumgarner, director of the research department at Unit consequences electronic American Foundation, a security non-profit organization providing advice to the industry and the government, saying, ‘What do those electronic processes is that they allow the United States to develop digital shoes on the ground in a foreign country, and to spare the lives of Americans risk in the short time span. Agency for the CIA does not need to send a spy to work from inside Iran, as well as the U.S. military does not need to send fighter aircraft stealth so broke there’s nothing there. ‘ is that followed by saying ‘but it was unclear now whether cyber spying and missiles digital like Stoxnt will sufficient in the long term to prevent a military conflict or not. Despite all these discoveries, but that there was still a great deal of denial is reasonable provided those weapons digital tools that are used in espionage. ‘ In the meantime, magazine reported Info Skjorta that a team of researchers approached step of discovery party that stands behind the virus flim which hit Iran last summer. and found two companies Kaspersky and Symantec, according to Ojeriah in this regard, that the virus flim offensive professional and highly sophisticated, and it carries implications that indicate being funded by a State, as indicated by reports of security at the beginning of his appearance. noted Symantec Corp. to that the process back in 2006, but made it clear that the servants had been created on the 25th of March and 18th of May two years. The researchers said the company ‘may not have been operators themselves familiar with the content of the stolen data due to the use of special techniques to divide data security. The use of this type of buildings that it is the work of an organized group, well-funded physically ‘. Elaph – Ashraf Abu Majesty
Source: ahraraliraq