Iran Released Severity of Narilam Malware
The US-based security giant, Symantec has organized a warning during the 4th week of November 2012, against the Narilam malware into circulation of recent paving threat to the Iranian authorities, as published in ZDNet.com on November 27, 2012.
Symantec posted a map that identified Iran as the prime victim posed by the W32.Narilam malware threat and signified the causes of this potential chaos. The malware is capable of copying itself on the infected machines, self-proclaimed to add registry keys and spread itself through the removable drives and network shares. The malware can be in someway related to the earlier high profile virus, Stuxnet that had caused havoc in several networks in the Middle-East countries, particularly Iran.
But, a statement disclosed by Iran's cyber emergency response team (CERT) or Maher Center, on Monday (November 26, 2012) blamed Symantec's report to be a kind of misapprehension regarding the malware.
CERT said: "The sample is not distributed and is only capable to corrupt the database of few of the products by an Iranian software company...accounting software for small businesses," the alert claims. "The simple nature of the malware looks more like [it's trying] to destroy the software company's reputation among their customers".
Security firm, Kaspersky Lab has also posted comments in regard to the same malware.
Kaspersky Lab researchers' (last week of November 2012) also shot down the initial advise that Narilam was related anyhow to Stuxnet and Flame, which actually unofficially attributed to the US and ISRAEL as a way to repeal Iran's nuclear weapons efforts. "Narilam is a old threat that was made active during late 2009 and 2010-mid," as per Kaspersky researchers, according to a report published in darkreading.com on November 26, 2012.
The researchers also claimed that 60% of the infections took place in Iran and rest in Afghanistan. Unlike Symantec assessment that Narilam is still dispersing, Kaspersky claimed that the malware is becoming inactive. The malware is presently almost disappeared - in the past month. We have noticed that just six examples of the threats were written by the researchers. The security firm (Kaspersky) has sent 80 events of infection reported in last two years.
Related article: Iran makes Arrests After Stuxnet Attacks on Nuclear Facilities
» SPAMfighter News - 07-12-2012