International Business Times
July 18, 2012
The active cyber-espionage campaign is targeting very specific victims including employees of critical infrastructure companies, financial services and government embassies, which are mainly located in Middle Eastern countries.
So far it is unclear whether or not this is a state-sponsored campaign like Stuxnet and Flame but the security company which first identified it, Seculert, has said the operation could require “a large investment and financial backing.” However the Madi info-stealing malware is also technically rudimentary in comparison to Stuxnet and Flame.
Seculert contacted Kaspersky Lab who discovered the highly-sophisticated Flame virus in order to help track the activity of the malware.
This article was posted: Wednesday, July 18, 2012 at 1:27 pm