A new Kaspersky Lab report revealed that a vicious cyber-espionage malware sibling was spawned from Flame. miniFlame is Flame's own evil Mini-Me which can work as a backdoor so operators can snag any file from an infected machine. It can take screenshots when specific Microsoft programs, Adobe Reader, instant messengers, FTP, or web browsers are open. It's also believed that SPE/miniFlame is in the wild. The cyber-espionage malware Flame has a vicious little sibling called miniFlame, according to a Kaspersky Lab report released today. This small, “high-precision, surgical attack tool” can operate as a standalone, without the Flame main modules, or as a component controlled by Flame or the espionage program Gauss. miniFlame is the first solid link that proves Flame and Gauss came from the same “cyberweapon factory.” Six different modifications of SPE, meaning miniFlame, have been identified so far, but Kaspersky researchers “believe that the developers of miniFlame created dozens of different modifications of the program.”Kaspersky wrote, “If Flame and Gauss were massive spy operations, infecting thousands of users, SPE/miniFlame is a high-precision espionage tool. The numbers of its victims is comparable to Duqu.”We can assume this malware was part of the Flame and Gauss operations which took place in multiple waves. First wave: infect as many potentially interesting victims as possible. Secondly, data is collected from the victims, allowing the attackers to profile them and find the most interesting targets. Finally, for these “select” targets, a specialized spy tool such as SPE/miniFlame is deployed to conduct surveillance/monitoring.Last month, Kaspersky experts said Flame had at least three more brothers: SP, SPE and IP. The report released today said SPE/miniFlame can use “its own C&C servers or common servers with Flame.” Regarding extremely targeted cyber-espionage maneuvers, miniFlame can work as a backdoor so operators can snag any file from an infected machine. It gives direct access to infected machines so operators can take screenshots when specific Microsoft programs, Adobe Reader, instant messengers, FTP, or web browsers are open. It’s also believed that SPE/miniFlame is in the wild.Here is a list of the available commands Kaspersky experts have identified: The handler routine for the “BARBARA” command can be run in a different mode and can produce screenshots only if the foreground window belongs to one of the processes from the hardcoded list; however, this functionality is disabled.The majority listed for BARBARA were Windows processes for Microsoft programs such as:Internet Explorer browser, MS Outlook, MS Outlook Express, MS Word, MS Excel, MSN Messenger, two different MSN Messenger extensions, Microsoft Developers Studio, Windows Explorer, MS FrontPage editor, Windows Telnet client, Windows FTP client, Windows Notepad, Microsoft Office Project, Microsoft PowerPoint, MS Visio, Microsoft Remote Desktop connection, Microsoft Management Console, Microsoft Office OneNote, Microsoft Office OneNote Quick Launcher and an IIS component. The entire list can be found on the detailed technical report. “The stolen data is encrypted on the server in such a way that only the attackers can read it, through strong public key cryptography,” Kaspersky reported. “These features are not normally found in malware created by everyday cyber-criminals, reaffirming our initial conclusions that Flame is a nation-state sponsored attack.”The number of known machines infected by miniFlame worldwide is much lower so far. The development of this malicious program may have started in 2007, but some versions of miniFlame were created in 2010 and 2011. In fact, some of the six variants are still considered active. Unlike Flame, which was mostly seen in Iran and Sudan, and unlike Gauss which was mostly seen in Lebanon, miniFlame malware variant infections have been seen in Lebanon, Palestine, Iran, Saudi Arabia, Qatar and Kuwait.The researchers were “able to trace the IPs in the United States to VPN connections.” While France is not exactly going down in flames, Kaspersky reported there are infections and that the “IPs in France are the most curious ones — some do appear to be proxies or VPNs, but others are not so obvious.” For example, “one of the IPs of victims in France belongs to Francois Rabelais University of Tours.”Kaspersky Lab revealed, “With Flame, Gauss and miniFlame, we have probably only scratched surface of the massive cyber-spy operations ongoing in the Middle East. Their true, full purpose remains obscure and the identity of the victims and attackers remain unknown.”Image credits: Kaspersky LabsLike this? Here’s more posts:Time to disable Java AGAIN: 1 billion at risk from newest critical Java bugFeds Warn of Zombie Apocalypse! Buy emergency kit, but you might be a terrorist if…Senate report: Fusion centers don’t find terrorists, filled with ‘crap’ that violates privacySmartphone snoop: Even when phone sleeps, digital assistant always eavesdrops Facebook Want Button: Collecting massive amounts of data about you has never been easier‘We will find you’ marketing gone wild: Candy bars that guarantee stalkersMicrosoft: Companies should pay Uncle Sam $10k per H-1B Visa to hire skilled foreignersLock picking hotel rooms like James BondGriefers, not rapture, make thousands of World of Warcraft players drop deadSurveillance State: From Inside Secret FBI Terrorist Screening Room to TrapWire TrainingSocial media surveillance helps the government read your mind Follow me on Twitter @PrivacyFanatic Related content news Dow Jones watchlist of high-risk businesses, people found on unsecured database A Dow Jones watchlist of 2.4 million at-risk businesses, politicians, and individuals was left unprotected on public cloud server. By Ms. Smith Feb 28, 2019 4 mins Data Breach Hacking Security news Ransomware attacks hit Florida ISP, Australian cardiology group Ransomware attacks might be on the decline, but that doesn't mean we don't have new victims. A Florida ISP and an Australian cardiology group were hit recently. By Ms. Smith Feb 27, 2019 4 mins Ransomware Security news Bare-metal cloud servers vulnerable to Cloudborne flaw Researchers warn that firmware backdoors planted on bare-metal cloud servers could later be exploited to brick a different customer’s server, to steal their data, or for ransomware attacks. By Ms. Smith Feb 26, 2019 3 mins Cloud Computing Security news Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR users Flaws in Bigscreen could allow 'invisible Peeping Tom' hackers to eavesdrop on Bigscreen VR users, to discreetly deliver malware payloads, to completely control victims' computers and even to start a worm infection spreading through VR By Ms. Smith Feb 21, 2019 4 mins Hacking Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe