Authored by: Anonymous on Tuesday, May 29 2012 @ 03:32 AM EDT |
Interesting. Pity the article doesn't mention what system(s) Flame can infect,
it would be nice to know if the alleged state-backed authors are still relying
on a certain North American corporation to provide the necessary back doors for
their malware.
A quick Google lead me here, which refers to it running on a patched Windows 7 machine, but it
is unclear whether more modern systems are vulnerable.
- O4W[ Reply to This | Parent | # ]
|
|
Authored by: Anonymous on Tuesday, May 29 2012 @ 12:17 PM EDT |
In systems from win2000-7 and server 2003/2008 for quartz.dll and/or
asysfilt.dll. Would have been patched with ms10-033 but some of these older
systems are forgotton in that regard.[ Reply to This | Parent | # ]
|
|
Authored by: Anonymous on Tuesday, May 29 2012 @ 01:48 PM EDT |
Wonder if they copyrighted it? [ Reply to This | Parent | # ]
|
|
Authored by: Anonymous on Tuesday, May 29 2012 @ 04:49 PM EDT |
According to
Wired,
The malware contains a hardcoded list of about five
domains, but also has an updatable list
One has to wonder to whom
those domains are registered.[ Reply to This | Parent | # ]
|
|
Authored by: Anonymous on Tuesday, May 29 2012 @ 08:11 PM EDT |
Current web reports state entry is through a common Windows XP, Vista, Windows7
vulnerability. How come the hole has been there that long?
20Mb indicates bloatware is needed to hide the thing[ Reply to This | Parent | # ]
|
|