How do you protect against Flame (also referred to as Flamer, sKyWIper, and Skywiper) malware?
There are no specific Flame signatures as this attack can use different penetrative methods. In order to provide the best chance of detection against it, IBM Security Systems recommend the following best practices:
- Ensure your IBM Intrusion Detection/Prevention Systems are running the latest available XPU version.
- Ensure that the X-Force recommended blocks are enabled. This can be confirmed in the X-Force Virtual Patch Policy for the Network IPS and within the Intrusion Prevention policy under the Protection Settings tab on the Proventia MFS. For IBM Security Host Protection, this is enabled by default.
- Ensure your systems are up-to-date with the latest security patches and antivirus signatures.
- Activate the MSRPC_Spoolss_GetDocPrinter_Exec signature which detects intrusion as described in the MSRPC_Spoolss_GetDocPrinter_Exec signature information. This is one possible method of exploit used by Flame.
- Physical controls will help against USB autorun attacks. Normal system authentication controls and restrictions will prevent a user with administrative privileges executing the malware.
More information about Flame can be found using the links in the Related information section below.
|Security||IBM Security Host Protection||Not Applicable||AIX, HP-UX, Linux, Windows||2.2.2, 7.0 - SR 4.1, 7.0 - SR 4.2, 7.0 - SR 4.3, 7.0 - SR 4.4, 1.0.0, 1.5.0||All Editions|
|Security||Proventia Network Multi-Function Security||Protocol Analysis Module (PAM)||Firmware||Version Independent||All Editions|