U.S. & Israel developed Flame Virus To Slow Iranian Nuclear Efforts
According to a report by Washington Post , the Flame Computer virus was developed by The United States and Israel jointly .
The so-called Flame malware aimed to map Iran's computer networks and monitor computers of Iranian officials, the newspaper said. It was designed to provide intelligence to help in a cyber campaign against Iran's nuclear program, involving the National Security Agency, the CIA and Israel's military, the Post said.
The cyber campaign against Iran's nuclear program has included the use of another computer virus called Stuxnet that caused malfunctions in Iran's nuclear enrichment equipment, the newspaper said.
The Flame Virus is said to be the most sophisticated malicious code ever developed .
. Experts said the program was designed to replicate across even highly secure networks, then control everyday computer functions to send secrets back to its creators. The code could activate computer microphones and cameras, log keyboard strokes, take screen shots, extract geo*location data from images, and send and receive commands and data through Bluetooth wireless technology.
Source
According to a report by Washington Post , the Flame Computer virus was developed by The United States and Israel jointly .

The so-called Flame malware aimed to map Iran's computer networks and monitor computers of Iranian officials, the newspaper said. It was designed to provide intelligence to help in a cyber campaign against Iran's nuclear program, involving the National Security Agency, the CIA and Israel's military, the Post said.
The cyber campaign against Iran's nuclear program has included the use of another computer virus called Stuxnet that caused malfunctions in Iran's nuclear enrichment equipment, the newspaper said.
The Flame Virus is said to be the most sophisticated malicious code ever developed .
. Experts said the program was designed to replicate across even highly secure networks, then control everyday computer functions to send secrets back to its creators. The code could activate computer microphones and cameras, log keyboard strokes, take screen shots, extract geo*location data from images, and send and receive commands and data through Bluetooth wireless technology.
Source