Flame Portable EDR : SUMURI Digital Forensics
$1,700.00
Flame Portable EDR single channel stand-alone version of FLAME can be connected to a monitor through HDMI or controlled by a tablet through wifi connection.
Description
- Flame Portable EDR Portability:ย Designed for easy transport and on-site, field-based forensic, and investigative work.
- Functionality:ย Acts as a single-channel, stand-alone, field-ready EDR unit.
- Connectivity:ย Supports HDMI connectivity to a monitor and Wi-Fi connection to a tablet for remote control.
- Usage:ย Part ofย SUMURI’s forensics toolsย for efficient data acquisition, distinct fromย Emerson’s Rosemount Flame Simulatorย orย LDARtools’ phx42 Portable FID.ย
While most Americans enjoyed a long holiday weekend, researchers in the security community were working around the clock to unravel the mysteries of one of the most intimidating pieces of malware code ever found.
Known by the names Flame, Flamer, and sKyWIper, the malware is significantly more complex then either Stuxnet or Duqu โ and it appears to be targeting the same part of the world, namely the Middle East.
Preliminary reports from various security researchers indicate that Flame likely is a cyberwarfare weapon designed by a nation-state to conduct highly targeted espionage. Using a modular architecture, the malware is capable of performing a wide variety of malicious functions โ including spying on usersโ keystrokes, documents, and spoken conversations.
Vikram Thakur, principal research manager at Symantec Security Response, toldย eSecurity Planetย that his firm was tipped off to the existence of Flame by Hungarian research group CrySys (Laboratory of Cryptography and System Security). As it turned out, Symantec already had the Flame malware (known to Symantec as W32.Flamer) in their database as it had been detected using a generic anti-virus signature. โOur telemetry tracked it back at least two years,โ Thakur said. โWeโre still digging in to see if similar files existed even prior to 2010.โ
Dave Marcus, Director of Security Research for McAfee Labs, toldย eSecurity Planetย that Flame shows the characteristics of a targeted attack.
โWith targeted attacks like Flamer, they are by nature not prevalent and not spreading out in the field,โ Marcus said. โItโs not spreading like spam, itโs very targeted, so weโve only seen a handful of detections globally.โ
While the bulk of all infections are in the Middle East, Marcus noted that he has seen command-and-control activity in other areas of the world. Generally speaking, malware command and control servers are rarely located in the same geographical region where the malware outbreaks are occuring, Marcus noted.
You must be logged in to post a review.

Reviews
There are no reviews yet.