Results 1 to 5 of 5

Thread: Stuxnet Virus - Politically Inspired cyberweapon?

Hybrid View

Previous Post Previous Post   Next Post Next Post
  1. #1

    Default Stuxnet Virus - Politically Inspired cyberweapon?

    <H1>The Stuxnet outbreak

    A worm in the centrifuge
    An unusually sophisticated cyber-weapon is mysterious but important

    Sep 30th 2010

    IT SOUNDS like the plot of an airport thriller or a James Bond film. A crack team of experts, assembled by a shadowy government agency, develops a cyber-weapon designed to shut down a rogue country’s nuclear programme. The software uses previously unknown tricks to worm its way into industrial control systems undetected, searching for a particular configuration that matches its target—at which point it wreaks havoc by reprogramming the system, closing valves and shutting down pipelines.
    </H1>
    Spoiler Alert, click show to read: 

    This is not fiction, but fact. A new software “worm” called Stuxnet (its name is derived from keywords buried in the code) seems to have been developed to attack a specific nuclear facility in Iran. Its sophistication suggests that it is the work of a well-financed team working for a government, rather than a group of rogue hackers trying to steal secrets or cause trouble. America and Israel are the obvious suspects. But Stuxnet’s origins and effects are unknown.
    Stuxnet first came to light in June, when it was identified by VirusBlokAda, a security firm in Belarus. The next month Siemens, a German industrial giant, warned customers that their “supervisory control and data acquisition” (SCADA) management systems, which control valves, pipelines and industrial equipment, were vulnerable to the worm. It targets a piece of Siemens software, called WinCC, which runs on Microsoft Windows.
    For security reasons SCADA systems are not usually connected to the internet. But Stuxnet can spread via infected memory sticks plugged into a computer’s USB port. Stuxnet checks to see if WinCC is running. If it is, it tries to log in, to install a clandestine “back door” to the internet, and then to contact a server in Denmark or Malaysia for instructions. (Analysis of traffic to these servers is continuing, and may offer the best chance of casting light on Stuxnet’s purpose and origins.) If it cannot find WinCC, it tries to copy itself on to other USB devices. It can also spread across local networks via shared folders and print spoolers.
    Initially, Stuxnet seemed to be designed for industrial espionage or to allow hackers to blackmail companies by threatening to shut down vital systems. But its unusual characteristics suggest another explanation. WinCC is a rather obscure SCADA system. Hackers hoping to target as many companies as possible would have focused on more popular systems. And Stuxnet searches for a particular configuration of industrial equipment as it spreads. It launches an attack only when it finds a match. “The bad news is that the virus is targeting a specific process or plant,” says Wieland Simon of Siemens. “The good news is that most industrial processes are not the target of the virus.” (Siemens says it knows of 15 plants around the world that were infected by Stuxnet, but their operations were unaffected as they were not the intended target.)
    Another odd feature is that Stuxnet uses two compromised security certificates (stolen from firms in Taiwan) and a previously unknown security hole in Windows to launch itself automatically from a memory stick. The use of such “zero-day vulnerabilities” by viruses is not unusual. But Stuxnet can exploit four entirely different ones in order to worm its way into a system. These holes are so valuable that hackers would not normally use four of them in a single attack. Whoever created Stuxnet did just that to boost its chances. They also had detailed knowledge of Siemens’s industrial-production processes and control systems, and access to the target plant’s blueprints. In short, Stuxnet was the work neither of amateur hackers nor of cybercriminals, but of a well- financed team. “Behind this virus there are experts,” says Mr Simon. “They need money and know-how.”
    So what was the target? Microsoft said in August that Stuxnet had infected more than 45,000 computers. Symantec, a computer-security firm, found that 60% of the infected machines were in Iran, 18% in Indonesia and 8% in India. That could be a coincidence. But if Stuxnet was aimed at Iran, one possible target is the Bushehr nuclear reactor. This week Iranian officials confirmed that Stuxnet had infected computers at Bushehr, but said that no damage to major systems had been done. Bushehr has been dogged by problems for years and its opening was recently delayed once again. Given that history, the latest hitch may not have been Stuxnet’s work.
    A more plausible target is Iran’s uranium-enrichment plant at Natanz. Inspections by the International Atomic Energy Agency, the UN’s watchdog, have found that about half Iran’s centrifuges are idle and those that work are yielding little. Some say a fall in the number of working centrifuges at Natanz in early 2009 is evidence of a successful Stuxnet attack.
    Last year Scott Borg of the United States Cyber-Consequences Unit, a think-tank, said that Israel might prefer to mount a cyber-attack rather than a military strike on Iran’s nuclear facilities. That could involve disrupting sensitive equipment such as centrifuges, he said, using malware introduced via infected memory sticks.
    His observation now looks astonishingly prescient. “Since the autumn of 2002, I have regularly predicted that this sort of cyber-attack tool would eventually be developed,” he says. Israel certainly has the ability to create Stuxnet, he adds, and there is little downside to such an attack, because it would be virtually impossible to prove who did it. So a tool like Stuxnet is “Israel’s obvious weapon of choice”. Some have even noted keywords in Stuxnet’s code drawn from the Bible’s Book of Esther—in which the Jews fight back to foil a plot to exterminate them.

    -The Economist


    Any thoughts? it sounds like a pretty good idea actually, if difficult to execute.
    "If you can't get rid of the skeleton in your closet, you'd best teach it to dance." - George Bernard Shaw (1856-1950)

  2. #2
    Corvis's Avatar Campidoctor
    Join Date
    Nov 2009
    Location
    Las Vegas, Nevada
    Posts
    1,993

    Default Re: Stuxnet Virus - Politically Inspired cyberweapon?

    The plot to the next Die Hard movie, "Tehran or Die Hard". The entire movie is just some hackers sitting at a computer and President Tom talks on the news about Israel being the devil.

  3. #3
    Katsumoto's Avatar Quae est infernum es
    Moderator Emeritus

    Join Date
    Feb 2009
    Posts
    11,783

    Default Re: Stuxnet Virus - Politically Inspired cyberweapon?

    The Age of Cyberwarfare has arrived.
    "I pray Heaven to bestow the best of blessings on this house and all that shall hereafter inhabit it. May none but honest and wise men ever rule under this roof."
    - John Adams, on the White House, in a letter to Abigail Adams (2 November 1800)

  4. #4
    Big War Bird's Avatar Vicarius Provinciae
    Join Date
    Jun 2004
    Location
    South Carolina, USA
    Posts
    12,340

    Default Re: Stuxnet Virus - Politically Inspired cyberweapon?

    The days of cute viruses are over I guess.
    As a teenager, I was taken to various houses and flats above takeaways in the north of England, to be beaten, tortured and raped over 100 times. I was called a “white slag” and “white ****” as they beat me.

    -Ella Hill

  5. #5
    Indefinitely Banned
    Join Date
    Nov 2007
    Posts
    21,467

    Default Re: Stuxnet Virus - Politically Inspired cyberweapon?

    what's interesting for me is whether stuxnet-since it has all the hallmarks of being a cyberweapon using state resources, and has the impact of ing up infrastructure-can be considered a physical attack and therefore, a declaration of war.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •