Protection against Flame/Skywiper malware
How do you protect against Flame (also referred to as Flamer, sKyWIper, and Skywiper) malware?
There are no specific Flame signatures as this attack can use different penetrative methods. In order to provide the best chance of detection against it, IBM Security Systems recommend the following best practices:
- Ensure your IBM Intrusion Detection/Prevention Systems are running the latest available XPU version.
- Ensure that the X-Force recommended blocks are enabled. This can be confirmed in the X-Force Virtual Patch Policy for the Network IPS and within the Intrusion Prevention policy under the Protection Settings tab on the Proventia MFS (MX). For IBM Security Host Protection, this is enabled by default.
- Ensure your systems are up-to-date with the latest security patches and antivirus signatures.
- Activate the MSRPC_Spoolss_GetDocPrinter_Exec signature which detects intrusion as described in the MSRPC_Spoolss_GetDocPrinter_Exec signature information. This is one possible method of exploit used by Flame.
- Physical controls will help against USB autorun attacks. Normal system authentication controls and restrictions will prevent a user with administrative privileges executing the malware.
More information about Flame can be found using the links in the Related information section below.
|Security||IBM Security Host Protection||Not Applicable||AIX, HP-UX, Linux, Windows||Version Independent|
|Security||Proventia Network Multi-Function Security||Protocol Analysis Module (PAM)||Firmware||Version Independent|
More support for:
IBM Security Network Intrusion Prevention System
Protocol Analysis Module (PAM)
Software version: Version Independent
Operating system(s): Firmware
Reference #: 1621360
Modified date: 07 January 2013
Translate this page: