6 of 24Image
State-sponsored Flame malware hits Middle East
Two years after Stuxnet infected Iranian nuclear facilities and damaged the country's ongoing nuclear program, malware called Flame was next to cause damage and disruption. Dubbed 'Flame' due to referenced words in fragments of code analyzed by Kaspersky Lab, the Russian antivirus and online security firm found the malware to be the "most complex threat" ever discovered. According to Kaspersky, the state-sponsored malware "redefines… cyberwar and cyberespionage."
Flame targeted machines in Iran, the Palestinian-controlled West Bank, Sudan, Syria, and others in the region, and was far more sophisticated than Stuxnet in a number of ways. Instead of just targeting the physical infrastructure of the network, it was designed to steal data and collect audio and video content from webcams and microphones.
Who or what was behind Flame remains unknown. While speculation remains rife around the circumstances of Stuxnet and similar state-sponsored malware attacks, some words in the code suggests an English-speaking country may have been behind the attack.