Kaspersky Labs finds similarities between Flame & Stuxnet Viruses !!!

Two leading companies in the computer security related part of software code in the virus called Stuxnet cyber powerful weapon, which is widely believed to have been used by the United States and Israel to attack Iran's nuclear program.

Eugene Kaspersky, CEO of Moscow-based Kaspersky Lab, which revealed the flame last month, said in the media and the World Summit Technology Reuters on Monday that its researchers have discovered that some program code Flame is nearly identical to code found in a 2009 version of Stuxnet.

More later in the day, the largest company security, Symantec Corp., said he had confirmed that the source code was shared. The new research could strengthen the belief of many security experts that Stuxnet was part of a cyber-led United still active in the Middle East and perhaps elsewhere.The flame is the most complex computer spy program was found and appeared to be sent to government offices and the power industry in Iran, Israel, Palestine and Sudan. It has the ability to steal or alter electronic documents. Llama has 20 times the amount of code and abducted Stuxnet Microsoft process automatic updates must be installed. Although neither Kaspersky or Symantec said they thought that organizations of flame new built, including Reuters and the New York Times, have indicated the United States and Israel were behind Stuxnet  which was discovered in 2010 after being damaged centrifuges used to enrich uranium at a plant in Natanz, Iran.Instead of issuing denials, authorities in Washington recently launched investigations into leaks about the top secret project. The White House declined to comment. The Stuxnet and flame "had two different teams working together," said Kaspersky Reuters in London.

The flame is a very sophisticated computer virus that masquerades as common business software. It has been deployed at least five years and can spy on the affected computers and steal data. Security experts have suspected links between the flame and where you can admire Stuxnet, another piece of malware that was discovered last year, but Kaspersky Lab was the first to say that he found solid evidence. Monday night, director of research at Symantec Liam O Murchu agree, with your company name for the virus, new flamethrower. "Security Response of Symantec and flamethrowers confirmed the participation Stuxnet of its source code"", writing O Murchu, adding that the analysis continues.

If America has emerged as a force behind the flame, to confirm the country that invented the Internet is involved in cyber espionage - something that has been criticized China, Russia and other nations. A Pentagon report last year described the strategy of the United States continues to evolve said cyber espionage could be the greatest long term threat to U.S. interests, pointing to the theft of trade secrets and defense, by software spies on the Internet. "There is a balkanization of cyberspace is happening, and companies must choose which side they are," said Dmitri Alperovich, co-founder of the U.S. CrowdStrike security company.

Kaspersky Lab said the flame was developed with a different set of tools that Stuxnet, but said his analysis is just beginning and it would take many months. After digging deeper, Kaspersky Lab, said Monday that its researchers have identified segments of the flame and a version of Stuxnet launched in 2009, which were almost identical - suggesting that the engineers who built the two viruses have had access to the same series Source. This suggests a close collaboration between the teams behind the two viruses. Eugene Kaspersky said it was clear that there were two or more teams with different styles, and calling all could have employed 100 people. Researchers have been looking for a link between Stuxnet and calls for the two viruses infect the machines, taking advantage of a flaw in Windows to launch the "Autorun", and personal computers infected by a small unit that is inserted through USB port. The section of code above the connection of two pieces of malware that affects not only the fault, but it does in the same style. The default value of Windows was not known before the discovery of Stuxnet in 2010, according Schouwenberg, a Kaspersky Lab researcher who helped discover the virus of the flame. Kaspersky Lab researchers found no components of the flame in the more advanced versions of Stuxnet, Schouwenberg added. "The flame is used as a sort of boost for the project Stuxnet" Schouwenberg theorized. "Once the team had their code Stuxnet ready, they left." He suspects that the creators of Stuxnet remove components from later versions so that the program calls would not be compromised if the attack against Iran's nuclear program was discovered. Stuxnet was discovered in 2010 and was followed closely by the world's smartest detectives cyberspace. However, the flame remained hidden until last month, when a UN agency has asked Kaspersky Lab looking for a virus that Iran said it had sabotaged their computers, deletion of valuable data. When the team began to look for suspicious files Kaspersky in the Middle East, met with the flame. Eugene Kaspersky, told Reuters about his company recently agreed to advise on matters of geopolitical security on the Internet more generally to the International Telecommunication Union United Nations. Russia and others want the group to take a
more active role in Internet governance. Schouwenberg said he suspects that the appellant may be able to erase data and attack control systems that manage industrial plants, such as uranium enrichment facilities at Natanz, but has not yet found proof. Kaspersky Lab researchers are still trying understand the functioning of over 100 files mysterious built in samples they have discovered fire, he said.