A new, highly sophisticated malware threat that was predominantly used in cyberespionage attacks against targets in the Middle East has been identified and analyzed by researchers from several security companies and organizations. Researchers from antivirus firm Kaspersky Lab have also analyzed the malware and found that while it is similar to Stuxnet and Duqu in terms of the geographic propagation and targeting, it is, in many ways, more complex than both of those threats. It can use a computer’s microphone to record conversations, take screenshots of particular applications when in use, record keystrokes and communicate with nearby Bluetooth devices.”]