May 1, 2024

Bits Blog: Virus Infects Computers Across Middle East

9:09 p.m. | Updated A complex computer virus has been pilfering confidential information from computers in the Middle East for at least two years, according to a security report released on Monday.

The virus, called Flame, has been infecting computers in Iran, Israel, Lebanon, Sudan, Syria, Saudi Arabia and Egypt. It has been grabbing images of users’ computer screens, recording their instant messaging chats, remotely turning on their microphones to record their audio conversations and monitoring their keystrokes and network traffic, according to a report by Kaspersky Labs, a Moscow-based security research firm.

If the report’s findings prove to be true, Flame would be the third major Internet weapon to have been discovered since 2010. The first, named Stuxnet, was intended to attack software in specialized industrial equipment, and was used to destroy centrifuges in an Iranian nuclear facility in 2010. The second virus, called Duqu, like Flame, performed reconnaissance. Security researchers believe Duqu was created by the same group of programmers behind Stuxnet.

The researchers said Flame appeared to have been developed by a different group of programmers. It contains 20 times more code than Stuxnet and is much more widespread than Duqu. Researchers believe Duqu hit fewer than 50 targets worldwide. Kaspersky’s researchers said they had detected Flame on thousands of computers belonging to individuals, private companies and universities across the Middle East.

“Flame can easily be described as one of the most complex threats ever discovered,” Alexander Gostev, the head of Kaspersky’s Global Research and Analysis team, wrote in a blog post on Monday. “It’s big and incredibly sophisticated. It pretty much redefines the notion of cyberwar and cyberespionage.”

Researchers say they do not know who is behind the virus, but given its complexity and the geography of its targets, they said it was most likely being staged by a government. The authors of Stuxnet and Duqu are also unknown but their targets and digital evidence suggest to some researchers that they may have been part of a joint American-Israeli project to sabotage Iran’s nuclear program.

Kaspersky’s researchers said the majority of computers infected with Flame were located in Iran. Like Duqu and Stuxnet, Flame infects machines through a known security hole in the Windows operating software.

Researchers discovered Flame while investigating reports that another computer virus, called Wiper, had been erasing computer programs in Iran. The International Telecommunications Union, a United Nations agency, had asked Kaspersky’s researchers to look into Wiper when they discovered that thousands more computers had been infected with Flame.

Article source: http://bits.blogs.nytimes.com/2012/05/28/new-computer-virus-looks-like-a-cyberweapon/?partner=rss&emc=rss

DealBook: Guilty Verdict Reached in Another Insider Trading Case

James FleishmanNorbert Von Der Groeben/ReutersJames Fleishman

8:22 p.m. | Updated

A former salesman at a Silicon Valley research firm was found guilty of conspiracy and wire fraud on Tuesday, the latest person to be convicted in the government’s sweeping investigation into insider trading at hedge funds.

After a two-week trial and just several hours of deliberations, a jury convicted James Fleishman, who worked at Primary Global Research in Mountain View, Calif., of orchestrating the secret exchange of information between hedge fund traders and employees at companies that included Advanced Micro Devices.

“Once again, a jury of 12 men and women has recognized insider trading for the crime that it is,” said Preet S. Bharara, the United States attorney in Manhattan whose office tried the case.

The case spotlighted so-called expert-network firms, once a fast-growing cottage industry on Wall Street. For a handsome fee, these firms connected hedge funds with paid consultants, or experts, who provided insights into companies and industries. Prosecutors exposed a problematic piece of their business model: Some of the consultants were executives of publicly traded companies, and they leaked secret information about their employers to the hedge funds.

Primary Global, which had prominent clients including the hedge fund SAC Capital, is the expert-network firm that has been the central focus of the government’s investigation. It has since closed its offices, and the government has charged at least seven people connected to the firm with insider trading crimes. A Primary Global spokesman declined to comment.

The government accused Mr. Fleishman, 42, of Santa Clara, Calif., of arranging meetings and telephone calls during which illegal tips were being swapped about Apple and other technology stocks. Two assistant United States attorneys, Antonia Apps and David Leibowitz, tried the case for the government.

Ethan Balogh, a lawyer for Mr. Fleishman, did not immediately respond to a request for comment. Judge Jed S. Rakoff set Mr. Fleishman’s sentencing for Dec. 21.

Over the last two years, federal prosecutors in Manhattan have charged 54 people with crimes related to insider trading. Of those, 49 have pleaded guilty or been convicted.

Mr. Fleishman was the sixth person to take a case to trial. All six have been found guilty, including Raj Rajaratnam, the former head of the Galleon Group hedge fund and Winifred Jiau, a former consultant at Primary Global.

Article source: http://feeds.nytimes.com/click.phdo?i=5d0328d03ab4e78e45c27c33a8a15bbd