English 中文网 漫画网 爱新闻iNews 翻译论坛
中国网站品牌栏目(频道)
当前位置: Language Tips > 新闻选读

世界最强计算机病毒被发现
Flame: world's most complex computer virus exposed

[ 2012-05-29 13:03] 来源:中国日报网     字号 [] [] []  
免费订阅30天China Daily双语新闻手机报:移动用户编辑短信CD至106580009009

俄罗斯电脑安全公司卡巴斯基实验室近日宣布,他们发现了目前为止世界上最复杂的一种电脑病毒“火焰”,它能收集数据、远程更改电脑设置、打开电脑麦克风并收录电脑周边的谈话,还能截屏并复制即时通讯工具聊天内容。专家表示,该病毒主要锁定伊朗等中东国家,其破坏能力比之前发现的Stuxnet和Duqu蠕虫病毒要强20多倍,推测应为国家资助开发的病毒。卡巴斯基实验室表示,该病毒早在五年前就进入计算机网络,目前已经感染了伊朗、以色列、苏丹、叙利亚、黎巴嫩、沙特阿拉伯以及埃及等国的计算机设备。有研究人员表示,“火焰”病毒背后的操作者可能与Stuxnet和Duqu蠕虫病毒为同一个或几个国家。

世界最强计算机病毒被发现

世界最强计算机病毒被发现

Kaspersky Labs said the program appeared to have been released five years ago and had infected machines in Iran, Israel, Sudan, Syria, Lebanon, Saudi Arabia and Egypt.

Middle Eastern states were targeted and Iran ordered an emergency review of official computer installations after the discovery of a new virus, known as Flame.

Experts said the massive malicious software was 20 times more powerful than other known cyber warfare programs including the Stuxnet virus and could only have been created by a state.

It is the third cyber attack weapon targeting systems in the Middle East to be exposed in recent years.

Iran has alleged that the West and Israel are orchestrating a secret war of sabotage using cyber warfare and targeted assassinations of its scientists as part of the dispute over its nuclear program.

Stuxnet attacked Iran's nuclear program in 2010, while a related program, Duqu, named after the Star Wars villain, stole data.

Flame can gather data files, remotely change settings on computers, turn on computer microphones to record conversations, take screen shots and copy instant messaging chats.

The virus was discovered by a Russian security firm Kaspersky lad that specializes in targeting malicious computer code.

It made the 20 gigabyte virus available to other researchers yesterday claiming it did not fully understand its scope and said its code was 100 times the size of the most malicious software.

Kaspersky Labs said the program appeared to have been released five years ago and had infected machines in Iran, Israel, Sudan, Syria, Lebanon, Saudi Arabia and Egypt.

"If Flame went on undiscovered for five years, the only logical conclusion is that there are other operations ongoing that we don't know about," Roel Schouwenberg, a Kaspersky security senior researcher, said.

Professor Alan Woodward from the department of computing at the University of Surrey said the virus was extremely invasive. It could "vacuum up" information by copying keyboard strokes and the voices of people nearby.

"This wasn't written by some spotty teenager in his/her bedroom. It is large, complicated and dedicated to stealing data whilst remaining hidden for a long time," he said.

The virus contains about 20 times as much code as Stuxnet, which attacked an Iranian uranium enrichment facility, causing centrifuges to fail. Iran's output of uranium was suffered a severe blow as a result of the Stuxnet activities.

Mr Schouwenberg said there was evidence to suggest the code was commissioned by the same nation or nations that were behind Stuxnet and Duqu.

Iran's Computer Emergency Response Team said it was "a close relation" of Stuxnet, which has itself been linked to Duqu, another complicated information-stealing virus is believed to be the work of state intelligence.

It said organizations had been given software to detect and remove the newly-discovered virus at the beginning of May.

Crysys Lab, which analyses computer viruses at Budapest University. said the technical evidence for a link between Flame and Stuxnet or Duqu was inconclusive.

The newly-discovered virus does not spread itself automatically but only when hidden controllers allow it.

Unprecedented layers of software allow Flame to penetrate remote computer networks undetected.

The file, which infects Microsoft Windows computers, has five encryption algorithms, exotic data storage formats and the ability to steal documents, spy on computer users and more.

Components enable those behind it, who use a network of rapidly-shifting "command and control" servers to direct the virus, to turn microphone into listening devices, siphon off documents and log keystrokes.

Eugene Kaspersky, the founder of Kaspersky Lab, noted that "it took us 6 months to analyse Stuxnet. [This] is 20 times more complicated".

Once a machine is infected additional modules can be added to the system allowing the machine to undertake specific tracking projects.

相关阅读

黑客以MJ之名传播病毒

病毒今日爆发 愚人还是害人

(Agencies)

世界最强计算机病毒被发现

(中国日报网英语点津 Helen 编辑)

 
中国日报网英语点津版权说明:凡注明来源为“中国日报网英语点津:XXX(署名)”的原创作品,除与中国日报网签署英语点津内容授权协议的网站外,其他任何网站或单位未经允许不得非法盗链、转载和使用,违者必究。如需使用,请与010-84883631联系;凡本网注明“来源:XXX(非英语点津)”的作品,均转载自其它媒体,目的在于传播更多信息,其他媒体如需转载,请与稿件来源方联系,如产生任何问题与本网无关;本网所发布的歌曲、电影片段,版权归原作者所有,仅供学习与研究,如果侵权,请提供版权证明,以便尽快删除。
 

关注和订阅

人气排行

翻译服务

中国日报网翻译工作室

我们提供:媒体、文化、财经法律等专业领域的中英互译服务
电话:010-84883468
邮件:translate@chinadaily.com.cn