Once a system is infected, Flame begins a complex set of operations, including sniffing the network traffic, taking screenshots, recording audio conversations, intercepting the keyboard, and so on. All this data is available to the operators through the link to Flame’s command-and-control servers.
- ROB RACHWALD, DIRECTOR OF SECURITY STRATEGY, IMPERVA
- InfoSecurity
- Posted On




