Stuxnet: Difference between revisions
Removal of nonsensical original research. Tag: references removed |
|||
Line 73: | Line 73: | ||
Alan Bentley of security firm Lumension has said that Stuxnet is "the most refined piece of malware ever discovered ... mischief or financial reward wasn't its purpose, it was aimed right at the heart of a critical infrastructure". Symantec estimates that the group developing Stuxnet would have been well-funded, consisting of five to ten people, and would have taken six months to prepare.<ref name=guardian>{{Cite web|url=http://www.guardian.co.uk/technology/2010/sep/24/stuxnet-worm-national-agency|title=Stuxnet worm is the 'work of a national government agency'|date=2010-09-24|accessdate=2010-09-27|publisher=The Guardian}}</ref> ''The Guardian'', the BBC and ''The New York Times'' all reported that experts studying Stuxnet considered that the complexity of the code indicates that only a nation state would have the capabilities to produce it.<ref name=BBC/><ref name=guardian/><ref name=nyt>{{cite web|last=Markoff|first=John|url=https://www.nytimes.com/2010/09/27/technology/27virus.html|title=A Silent Attack, but Not a Subtle One|publisher=New York Times|date=2010-09-26 |accessdate=2010-09-27}}</ref> |
Alan Bentley of security firm Lumension has said that Stuxnet is "the most refined piece of malware ever discovered ... mischief or financial reward wasn't its purpose, it was aimed right at the heart of a critical infrastructure". Symantec estimates that the group developing Stuxnet would have been well-funded, consisting of five to ten people, and would have taken six months to prepare.<ref name=guardian>{{Cite web|url=http://www.guardian.co.uk/technology/2010/sep/24/stuxnet-worm-national-agency|title=Stuxnet worm is the 'work of a national government agency'|date=2010-09-24|accessdate=2010-09-27|publisher=The Guardian}}</ref> ''The Guardian'', the BBC and ''The New York Times'' all reported that experts studying Stuxnet considered that the complexity of the code indicates that only a nation state would have the capabilities to produce it.<ref name=BBC/><ref name=guardian/><ref name=nyt>{{cite web|last=Markoff|first=John|url=https://www.nytimes.com/2010/09/27/technology/27virus.html|title=A Silent Attack, but Not a Subtle One|publisher=New York Times|date=2010-09-26 |accessdate=2010-09-27}}</ref> |
||
[[Israel]], perhaps through [[Unit 8200]],<ref>[http://www.guardian.co.uk/technology/2010/sep/30/stuxnet-worm-new-era-global-cyberwar Stuxnet worm heralds new era of global cyberwar], guardian.co.uk, 30 September 2010</ref> has been speculated to be the country behind Stuxnet in many of the media reports<ref name=guardian/><ref name=FP>{{cite web|last=Hounshell|first= Blake|url=http://blog.foreignpolicy.com/posts/2010/09/27/6_mysteries_about_stuxnet|title=6 mysteries about Stuxnet|publisher=Foreign Policy|date=2010-09-27 |accessdate=2010-09-28}}</ref><ref name=economist>{{cite web|url=http://www.economist.com/blogs/babbage/2010/09/stuxnet_worm |title=The Stuxnet worm: A cyber-missile aimed at Iran? |publisher=The Economist |date=2010-09-24 |accessdate=2010-09-28}}</ref> and by experts such as [[Richard A. Falkenrath|Richard Falkenrath]], former Senior Director for Policy and Plans within the [[Office of Homeland Security]].<ref name=Yahoo!>Falkenrath Says Stuxnet Virus May Have Origin in Israel: Video. Bloomberg Television 2010-09-24 [http://finance.yahoo.com/video/marketnews-19148628/falkenrath-says-stuxnet-virus-may-have-origin-in-israel-video-22090127#video=22147179]</ref> This is also due to several clues in the code such as a concealed reference to the word "MYRTUS", believed to refer to the Myrtle tree, or Hadassah in Hebrew. Hadassah was the birth name of the former Jewish queen of Persia, Queen [[Esther]]. In the Book of Esther, Jewish forces, after unraveling a Persian attack plan, stage a preemptive and successful assault against their adversaries.<ref name=MES> Iran/Critical National Infrastructure: Cyber Security Experts See The Hand Of Israel's Signals Intelligence Service In The "Stuxnet" Virus Which Has Infected Iranian Nuclear Facilities, 01 September 2010. [http://www.mideastsecurity.co.uk/?tag=stuxnet-myrtus-myrtle].</ref><ref>{{cite web|last=Riddle|first= Warren|url=http://www.switched.com/2010/10/01/mysterious-myrtus-biblical-reference-spotted-in-stuxnet-code/|title=Mysterious 'Myrtus' Biblical Reference Spotted in Stuxnet Code |publisher=SWITCHED|date=2010-10-1 |accessdate=2010-10-06}}</ref> However, it may be that the "MYRTUS" reference is simply a misinterpreted reference to [[SCADA]] components known as ''RTUs'' (Remote Terminal Units) and that this reference is actually "My RTUs" — a management feature of SCADA.<ref name=scada_rtus>{{cite web|url=http://www.motorola.com/web/Business/Products/SCADA%20Products/_Documents/Static%20Files/SCADA_Sys_Wht_Ppr-2a_New.pdf|title=SCADA Systems Whitepaper|publisher=Motorola}}</ref> Also, the number 19790509 appears once in the code and might refer to the date "1979 May 09", the day [[Habib Elghanian]], a Persian Jew, was executed in [[Tehran]].<ref name=symantec>{{cite web|url=http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf|title=W32.Stuxnet Dossier|publisher=Symantec Corporation}}</ref><ref>{{cite web|url=http://www.pcmag.com/article2/0,2817,2370107,00.asp|title=Symantec Puts 'Stuxnet' Malware Under the Knife|publisher=PC Magazine}}</ref><ref>{{cite web|url=http://www.wired.com/threatlevel/2010/10/stuxnet-deconstructed/|title=New Clues Point to Israel as Author of Blockbuster Worm, Or Not|publisher=Wired}}</ref>< |
[[Israel]], perhaps through [[Unit 8200]],<ref>[http://www.guardian.co.uk/technology/2010/sep/30/stuxnet-worm-new-era-global-cyberwar Stuxnet worm heralds new era of global cyberwar], guardian.co.uk, 30 September 2010</ref> has been speculated to be the country behind Stuxnet in many of the media reports<ref name=guardian/><ref name=FP>{{cite web|last=Hounshell|first= Blake|url=http://blog.foreignpolicy.com/posts/2010/09/27/6_mysteries_about_stuxnet|title=6 mysteries about Stuxnet|publisher=Foreign Policy|date=2010-09-27 |accessdate=2010-09-28}}</ref><ref name=economist>{{cite web|url=http://www.economist.com/blogs/babbage/2010/09/stuxnet_worm |title=The Stuxnet worm: A cyber-missile aimed at Iran? |publisher=The Economist |date=2010-09-24 |accessdate=2010-09-28}}</ref> and by experts such as [[Richard A. Falkenrath|Richard Falkenrath]], former Senior Director for Policy and Plans within the [[Office of Homeland Security]].<ref name=Yahoo!>Falkenrath Says Stuxnet Virus May Have Origin in Israel: Video. Bloomberg Television 2010-09-24 [http://finance.yahoo.com/video/marketnews-19148628/falkenrath-says-stuxnet-virus-may-have-origin-in-israel-video-22090127#video=22147179]</ref> This is also due to several clues in the code such as a concealed reference to the word "MYRTUS", believed to refer to the Myrtle tree, or Hadassah in Hebrew. Hadassah was the birth name of the former Jewish queen of Persia, Queen [[Esther]]. In the Book of Esther, Jewish forces, after unraveling a Persian attack plan, stage a preemptive and successful assault against their adversaries.<ref name=MES> Iran/Critical National Infrastructure: Cyber Security Experts See The Hand Of Israel's Signals Intelligence Service In The "Stuxnet" Virus Which Has Infected Iranian Nuclear Facilities, 01 September 2010. [http://www.mideastsecurity.co.uk/?tag=stuxnet-myrtus-myrtle].</ref><ref>{{cite web|last=Riddle|first= Warren|url=http://www.switched.com/2010/10/01/mysterious-myrtus-biblical-reference-spotted-in-stuxnet-code/|title=Mysterious 'Myrtus' Biblical Reference Spotted in Stuxnet Code |publisher=SWITCHED|date=2010-10-1 |accessdate=2010-10-06}}</ref> However, it may be that the "MYRTUS" reference is simply a misinterpreted reference to [[SCADA]] components known as ''RTUs'' (Remote Terminal Units) and that this reference is actually "My RTUs" — a management feature of SCADA.<ref name=scada_rtus>{{cite web|url=http://www.motorola.com/web/Business/Products/SCADA%20Products/_Documents/Static%20Files/SCADA_Sys_Wht_Ppr-2a_New.pdf|title=SCADA Systems Whitepaper|publisher=Motorola}}</ref> Also, the number 19790509 appears once in the code and might refer to the date "1979 May 09", the day [[Habib Elghanian]], a Persian Jew, was executed in [[Tehran]].<ref name=symantec>{{cite web|url=http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf|title=W32.Stuxnet Dossier|publisher=Symantec Corporation}}</ref><ref>{{cite web|url=http://www.pcmag.com/article2/0,2817,2370107,00.asp|title=Symantec Puts 'Stuxnet' Malware Under the Knife|publisher=PC Magazine}}</ref><ref>{{cite web|url=http://www.wired.com/threatlevel/2010/10/stuxnet-deconstructed/|title=New Clues Point to Israel as Author of Blockbuster Worm, Or Not|publisher=Wired}}</ref>According to the New York Times a former member of the United States intelligence community said that the attack had been the work of Unit 8200.<ref>[http://www.nytimes.com/2010/09/27/technology/27virus.html?_r=2 Kevon O'Brien, A Silent Attack, but Not a Subtle One, New York Times online vom 30. September 2010], see also [http://stirling-westrup-tt.blogspot.com/2010/09/tt-nyt-stuxnet-worm-is-remarkable-for.html]</ref> Additionally, in 2009, a year before Stuxnet was discovered, Scott Borg of [[the United States Cyber-Consequences Unit]] had suggested that Israel might prefer to mount a cyber-attack rather than a military strike on Iran's nuclear facilities. According to Borg this kind of attack could involve disrupting sensitive equipment such as centrifuges using malware introduced via infected memory sticks: "Since the autumn of 2002, I have regularly predicted that this sort of cyber-attack tool would eventually be developed ... Israel certainly has the ability to create Stuxnet and there is little downside to such an attack, because it would be virtually impossible to prove who did it. So a tool like Stuxnet is Israel's obvious weapon of choice."<ref>A worm in the centrifuge:An unusually sophisticated cyber-weapon is mysterious but important. The Economist, 30 September 2010 [http://www.economist.com/node/17147818]</ref> |
||
Another hint comes from the fact that writing the word "stux" in a hebrew keyboard<ref>{cite web|url=http://www.mikledet.com/}</ref>, will yield the word "Deux", which is god in latin, and the name of a hebrew TV show that features a group of hackers.<ref>{{cite web|url=http://he.wikipedia.org/wiki/%D7%93%D7%90%D7%95%D7%A1_(%D7%A1%D7%93%D7%A8%D7%AA_%D7%98%D7%9C%D7%95%D7%95%D7%99%D7%96%D7%99%D7%94)}}</ref><br>According to the New York Times a former member of the United States intelligence community said that the attack had been the work of Unit 8200.<ref>[http://www.nytimes.com/2010/09/27/technology/27virus.html?_r=2 Kevon O'Brien, A Silent Attack, but Not a Subtle One, New York Times online vom 30. September 2010], see also [http://stirling-westrup-tt.blogspot.com/2010/09/tt-nyt-stuxnet-worm-is-remarkable-for.html]</ref> In 2009, a year before Stuxnet was discovered, Scott Borg of [[the United States Cyber-Consequences Unit]] had suggested that Israel might prefer to mount a cyber-attack rather than a military strike on Iran's nuclear facilities. According to Borg this kind of attack could involve disrupting sensitive equipment such as centrifuges using malware introduced via infected memory sticks: "Since the autumn of 2002, I have regularly predicted that this sort of cyber-attack tool would eventually be developed ... Israel certainly has the ability to create Stuxnet and there is little downside to such an attack, because it would be virtually impossible to prove who did it. So a tool like Stuxnet is Israel's obvious weapon of choice."<ref>A worm in the centrifuge:An unusually sophisticated cyber-weapon is mysterious but important. The Economist, 30 September 2010 [http://www.economist.com/node/17147818]</ref> |
|||
There has also been speculation on the involvement of [[NATO]], the United States and other Western nations.<ref>{{cite web|url=http://www.cbsnews.com/8301-501465_162-20017507-501465.html|title=Stuxnet Worm a U.S. Cyber-Attack on Iran Nukes?|publisher=CBS News}}</ref> |
There has also been speculation on the involvement of [[NATO]], the United States and other Western nations.<ref>{{cite web|url=http://www.cbsnews.com/8301-501465_162-20017507-501465.html|title=Stuxnet Worm a U.S. Cyber-Attack on Iran Nukes?|publisher=CBS News}}</ref> |
Revision as of 12:57, 15 October 2010
Stuxnet is a Windows-specific computer worm first discovered in June 2010 by VirusBlokAda, a security firm based in Belarus. It is the first discovered worm that spies on and reprograms industrial systems.[1] It was specifically written to attack Supervisory Control And Data Acquisition (SCADA) systems used to control and monitor industrial processes.[2] Stuxnet includes the capability to reprogram the programmable logic controllers (PLCs) and hide the changes.[3]
It is the first-ever computer worm to include a PLC rootkit.[4] It is also the first known worm to target critical industrial infrastructure.[5] Furthermore, the worm's probable target has been said to have been high value infrastructures in Iran using Siemens control systems.[6][7] According to news reports the infestation by this worm might have damaged Iran's nuclear facilities in Natanz[8][9] and eventually delayed the start up of Iran's Bushehr Nuclear Power Plant.[10] Siemens has stated, however, that the worm has not in fact caused any damage.[11]
Russian digital security company Kaspersky Labs released a statement that described Stuxnet as "a working and fearsome prototype of a cyber-weapon that will lead to the creation of a new arms race in the world. Or, people can simply avoid the danger by not using Microsoft products." Kevin Hogan, Senior Director of Security Response at Symantec, noted that 60 percent of the infected computers worldwide were in Iran, suggesting its industrial plants were the target.[12] Kaspersky Labs concluded that the attacks could only have been conducted "with nation-state support", making Iran the first target of real cyber warfare.[13][14][15]
The origins of the worm are the subject of intense speculation.
History
It was first reported by the security company VirusBlokAda in mid-June 2010, and roots of it have been traced back to June 2009.[3] The worm contains a component with a build time stamp from 3 February 2010.[16]
Affected countries
A study of the spread of Stuxnet by Symantec showed that the main affected countries as of August 6, 2010 were:[17]
Country | Infected Computers |
---|---|
China | 6,000,000 (unconfirmed)[18] (October 1) |
Iran | 62,867 |
Indonesia | 13,336 |
India | 6,552 |
United States | 2,913 |
Australia | 2,436 |
Britain | 1,038 |
Malaysia | 1,013 |
Pakistan | 993 |
Finland | 7[19] |
Germany | 5[20] (September) |
Operation
Stuxnet attacks Windows systems using four zero-day attacks (including the CPLINK vulnerability and a vulnerability used by the Conficker worm) and targets systems using Siemens' WinCC/PCS 7 SCADA software. It is initially spread using infected USB flash drives and then uses other exploits to infect other WinCC computers in the network. Once inside the system it uses the default passwords to command the software.[3] Siemens, however, advises against changing the default passwords because it "could impact plant operations."[21]
The complexity of the software is very unusual for malware. The attack requires knowledge of industrial processes and an interest in attacking industrial infrastructure.[1][3] The number of used zero-day Windows exploits is also unusual, as zero-day Windows exploits are valued, and hackers do not normally waste the use of four different ones in the same worm.[6] Stuxnet is unusually large at half a megabyte in size,[22] and written in different programming languages (including C and C++) which is also irregular for malware.[1][3] It is digitally signed with two authentic certificates which were stolen[22] from two certification authorities (JMicron and Realtek) which helped it remain undetected for a relatively long period of time.[23] It also has the capability to upgrade via peer to peer, allowing it to be updated after the initial command and control server was disabled.[22][24] These capabilities would have required a team of people to program, as well as check that the malware would not crash the PLCs. Eric Byres, who has years of experience maintaining and troubleshooting Siemens systems, told Wired that writing the code would have taken many man-months, if not years.[22]
A Siemens spokesperson said that the worm was found on 15 systems with five of the infected systems being process manufacturing plants in Germany. Siemens claims that no active infections have been found and there were no reports of damages caused by the worm.[20] Jeffrey Carr raised the possibility that the Stuxnet took India's INSAT-4B Satellite out of action, making it effectively dead.[25] However, ISRO has provisionally ruled out the possibility of Stuxnet attack, and awaits further details from Carr's presentation on the topic.[26]
Removal
Siemens has released a detection and removal tool for Stuxnet. Siemens recommends contacting customer support if an infection is detected and advises installing the Microsoft patch for vulnerabilities and disallowing the use of third-party USB sticks.[27]
The worm's ability to reprogram external programmable logic controllers (PLCs) may complicate the removal procedure. Symantec's Liam O'Murchu warns that fixing Windows systems may not completely solve the infection; a thorough audit of PLCs is recommended. In addition, it has been speculated that incorrect removal of the worm could cause a significant amount of damage.[28]
Prevention
Prevention of control system security incidents,[29] such as from viral infections like Stuxnet, is a topic that is being addressed by in both the public and the private sector. The U.S. Department of Homeland Security (DHS) National Cyber Security Division's operates the Control System Security Program (CSSP).[30] The program operates a specialized Computer Emergency Response Team (ICS-CERT), conducts a biannual conference (ICSJWG), provides training, publishes recommended practices, and provides a self-assessment tool. Several industry organizations[31][32]and professional societies[33][34]have published standards and best practice guidelines providing direction and guidance for control system end-users on how to establish a control system security management program. The basic premise that all of these documents share is that prevention requires a multi-layered approach, often referred to as "defense-in-depth". The layers include policies & procedures, awareness & training, network segmentation, access control measures, physical security measures, system hardening, e.g., patch management, and system monitoring e.g., anti-virus, IDS, etc. The standards and best practices also all recommend starting with a risk analysis and a control system security assessment.[35] The purpose is to assess the current level of risk and the size of the gap between that risk and what is tolerable. The other purpose of an assessment is to identify the vulnerabilities and develop a prioritized program to eliminate or minimize them.
Over the last 10 to 15 years most commercial control systems have adopted the Microsoft Windows operating system for programming and visualization of the embedded controllers and Ethernet TCP/IP infrastructure for communications. This trend has significantly increased the vulnerability of these systems to both intentional (e.g., hackers) and unintentional (e.g., malware) security incidents. Some argue that industrial operators should move to free UNIX-like operating systems such as GNU/Linux, Netbsd, or FreeBSD and avoid the severe vulnerabilities that are a natural result of running Microsoft Windows operating systems.
In response to this concern, Cyber security standards and certifications programs such as ISA 99 and ISASecure have been developed to evaluate and certify the security of industrial automation products.
Speculations about the target and origin
Alan Bentley of security firm Lumension has said that Stuxnet is "the most refined piece of malware ever discovered ... mischief or financial reward wasn't its purpose, it was aimed right at the heart of a critical infrastructure". Symantec estimates that the group developing Stuxnet would have been well-funded, consisting of five to ten people, and would have taken six months to prepare.[36] The Guardian, the BBC and The New York Times all reported that experts studying Stuxnet considered that the complexity of the code indicates that only a nation state would have the capabilities to produce it.[6][36][37]
Israel, perhaps through Unit 8200,[38] has been speculated to be the country behind Stuxnet in many of the media reports[36][39][40] and by experts such as Richard Falkenrath, former Senior Director for Policy and Plans within the Office of Homeland Security.[41] This is also due to several clues in the code such as a concealed reference to the word "MYRTUS", believed to refer to the Myrtle tree, or Hadassah in Hebrew. Hadassah was the birth name of the former Jewish queen of Persia, Queen Esther. In the Book of Esther, Jewish forces, after unraveling a Persian attack plan, stage a preemptive and successful assault against their adversaries.[42][43] However, it may be that the "MYRTUS" reference is simply a misinterpreted reference to SCADA components known as RTUs (Remote Terminal Units) and that this reference is actually "My RTUs" — a management feature of SCADA.[44] Also, the number 19790509 appears once in the code and might refer to the date "1979 May 09", the day Habib Elghanian, a Persian Jew, was executed in Tehran.[45][46][47]According to the New York Times a former member of the United States intelligence community said that the attack had been the work of Unit 8200.[48] Additionally, in 2009, a year before Stuxnet was discovered, Scott Borg of the United States Cyber-Consequences Unit had suggested that Israel might prefer to mount a cyber-attack rather than a military strike on Iran's nuclear facilities. According to Borg this kind of attack could involve disrupting sensitive equipment such as centrifuges using malware introduced via infected memory sticks: "Since the autumn of 2002, I have regularly predicted that this sort of cyber-attack tool would eventually be developed ... Israel certainly has the ability to create Stuxnet and there is little downside to such an attack, because it would be virtually impossible to prove who did it. So a tool like Stuxnet is Israel's obvious weapon of choice."[49]
There has also been speculation on the involvement of NATO, the United States and other Western nations.[50]
Symantec claims that the majority of infected systems were in Iran (about 60%),[51] which has led to speculation that it may have been deliberately targeting "high-value infrastructure" in Iran[6] including either the Bushehr Nuclear Power Plant or the Natanz nuclear facility.[22] Ralph Langner, a German cyber-security researcher, called the malware "a one-shot weapon" and said that the intended target was probably hit,[52] although he admitted this was speculation.[22]
There are reports that Iran's uranium enrichment facility at the Natanz facility was the target of Stuxnet and the site sustained damage because of it causing a sudden 15% reduction in its production capabilities. There was also a previous report by wikileaks disclosing a "serious nuclear accident" at the site in 2009.[9][40][53][54][55][56] According to statistics published by the Federation of American Scientists (FAS) the number of enriched centrifuges operational in Iran mysteriously declined from about 4,700 to about 3,900 beginning around the time the nuclear incident WikiLeaks mentioned would have occurred.[57]
The name is derived from some keywords discovered in the software.[58] Since the whole Stuxnet code has not yet been decrypted, its intent remains unknown. Among its peculiar capabilities is a fingerprinting technology which allows it to precisely identify the systems it infects. It appears to be looking for a particular system to destroy at a specific time and place. Once it has infected a system it performs a check every 5 seconds to determine if its parameters for launching an attack are met. The exact way through which Stuxnet destroys its target is still a mystery but it is thought[by whom?] that it may be programmed to cause a catastrophic physical failure by, for example, overriding turbine RPM limits, shutting down lubrication or cooling systems, or sabotaging the high-speed spinning process of centrifuge arrays at Iran's Natanz nuclear facility.[52][59] Since the complex code of Stuxnet looks for a very particular type of system and controller, it has been theorized that the target is of a high importance for the attacker.[60]
Iranian reaction
The Associated Press reported that the semi-official Iranian Students News Agency released a statement on 24 September 2010 stating that experts from the Atomic Energy Organization of Iran met in the previous week to discuss how Stuxnet could be removed from their systems.[2] Western intelligence agencies have been attempting to sabotage the Iranian nuclear program for some time, according to analysts.[61][62]
The head of the Bushehr Nuclear Power Plant told Reuters that only the personal computers of staff at the plant had been infected by Stuxnet and the state-run newspaper Iran Daily quoted Reza Taghipour, Iran's telecommunications minister, as saying that it had not caused "serious damage to government systems".[37] Director of Information Technology Council at the Iranian Ministry of Industries and Mines, Mahmud Liaii has said that: "An electronic war has been launched against Iran... This computer worm is designed to transfer data about production lines from our industrial plants to locations outside Iran."[63]
It is believed that infection had originated from Russian laptops belonging to Russian contractors at the site of Bushehr power plant and spreading from there with the aim of targeting the power plant control systems.[64][65][66] It has also been reported that the United States, under one of its most secret programs, initiated by the Bush administration and accelerated by the Obama administration, has sought to destroy Iran's nuclear program by novel methods such as undermining Iranian computer systems.[67] In response to the infection, Iran has assembled a team to combat it. With more than 30,000 IP addresses affected in Iran, an official has said that the infection is fast spreading in Iran and the problem has been compounded by the ability of Stuxnet to mutate. Iran has set up its own systems to clean up infections and has advised against using the Siemens SCADA antivirus since it is suspected that the antivirus is actually embedded with codes which update Stuxnet instead of eradicating it.[68][69][70][71]
According to Hamid Alipour, deputy head of Iran's government Information Technology Company, "The attack is still ongoing and new versions of this virus are spreading." He reports that his company had begun the cleanup process at Iran's "sensitive centres and organizations."[69] "We had anticipated that we could root out the virus within one to two months, but the virus is not stable, and since we started the cleanup process three new versions of it have been spreading," he told the Islamic Republic News Agency.[71]
See also
- Cyber electronic warfare
- Cyberwarfare
- Cyberwarfare in the United States
- Electronic warfare
- Industrial Espionage
- Information warfare
- List of cyber attack threat trends
- National Security Agency
- Proactive Cyber Defence
- Sabotage
- Siberian pipeline sabotage
- United States Cyber Command
- Cyber security standards
- Control System Security
References
- ^ a b c Robert McMillan (16 September 2010). "Siemens: Stuxnet worm hit industrial systems". Computerworld. Retrieved 16 September 2010.
- ^ a b "Iran's Nuclear Agency Trying to Stop Computer Worm". Tehran: Associated Press. 25 September 2010. Archived from the original on 25 September 2010. Retrieved 25 September 2010.
- ^ a b c d e Gregg Keizer (16 September 2010). "Is Stuxnet the 'best' malware ever?". Infoworld. Retrieved 16 September 2010.
- ^ "Last-minute paper: An indepth look into Stuxnet". Virus Bulletin.
- ^ "Stuxnet worm hits Iran nuclear plant staff computers". BBC News.
- ^ a b c d Fildes, Jonathan (23 September 2010). "Stuxnet worm 'targeted high-value Iranian assets'". BBC News. Retrieved 23 September 2010.
- ^ "Stuxnet virus: worm 'could be aimed at high-profile Iranian targets'". The Daily Telegraph. 23 September 2010. Retrieved 28 September 2010.
- ^ Ethan Bronner & William J. Broad (29 September 2010). "In a Computer Worm, a Possible Biblical Clue". NYTimes. Retrieved 2 October 2010.
- ^ a b "Iran Confirms Stuxnet Damage to Nuclear Facilities". Tikun Olam. 25 September 2010. Retrieved 28 September 2010.
- ^ "Software smart bomb fired at Iranian nuclear plant: Experts". Economictimes.indiatimes.com. 24 September 2010. Retrieved 28 September 2010.
- ^ ComputerWorld (14 September 2010). "Siemens: Stuxnet worm hit industrial systems". Computerworld. Retrieved 3 October 2010.
- ^ http://www.reuters.com/article/idUSLDE68N1OI20100924
- ^ http://news.scotsman.com/world/Iran-39first-victim-of-cyberwar39.6550278.jp
- ^ http://www.pakalertpress.com/2010/09/26/iran-first-victim-of-cyberwar/
- ^ http://www.mymacaddress.com/iran-first-victim-of-cyberwar/
- ^ Aleksandr Matrosov, Eugene Rodionov, David Harley, and Juraj Malcho. "Stuxnet under the microscope" (PDF). Retrieved 24 September 2010.
{{cite web}}
: CS1 maint: multiple names: authors list (link) - ^ "Factbox: What is Stuxnet?". Retrieved 30 September 2010.
- ^ John Leyden (1 October 2010). "Stuxnet worm slithers into China, heralds alien invasion". TheRegister. Retrieved 2 October 2010.
Rising International told the official Xinhua news agency that six million individuals and nearly 1,000 corporate accounts across China had been infected ... However Yu Xiaoqiu, ... said it hadn't witnessed any damage
- ^ cert-fi (1 October 2010). "Stuxnetista havaintoja myös suomalaisissa verkoissa". CERT-FI. Retrieved 14 October 2010.
- ^ a b crve (17 September 2010). "Stuxnet also found at industrial plants in Germany". The H. Retrieved 18 September 2010.
- ^ Tom Espiner (20 July 2010). "Siemens warns Stuxnet targets of password risk". cnet. Retrieved 17 September 2010.
- ^ a b c d e f Kim Zetter (23 September 2010). "Blockbuster Worm Aimed for Infrastructure, But No Proof Iran Nukes Were Target". Wired. Retrieved 24 September 2010.
- ^ "Kaspersky Lab provides its insights on Stuxnet worm". Kaspersky Lab. 24 September 2010. Retrieved 27 September 2010.
- ^ Liam O Murchu (17 September 2010). "Stuxnet P2P component". Symantec. Retrieved 24 September 2010.
- ^ [1]
- ^ "Cyber threat: ISRO rules out Stuxnet attack on INSAT-4B". Economic Times. 12 October 2010.
- ^ "SIMATIC WinCC / SIMATIC PCS 7: Information concerning Malware / Virus / Trojan". Siemens. Retrieved 24 September 2010.
- ^ "Siemens: Stuxnet Worm Hit Industrial Systems". IDG News.
- ^ "Repository of Industrial Security Incidents". Security Incidents Organization. Retrieved 14 October 2010.
- ^ "DHS National Cyber Security Division's CSSP". DHS. Retrieved 14 October 2010.
- ^ "ISA99, Industrial Automation and Control System Security". ISA. Retrieved 14 October 2010.
- ^ "Industrial communication networks - Network and system security - Part 2-1: Establishing an industrial automation and control system security program". IEC. Retrieved 14 October 2010.
- ^ "Chemical Sector Cyber Security Program". ACC ChemITC. Retrieved 14 October 2010.
- ^ "Pipeline SCADA Security". API. Retrieved 14 October 2010.
- ^ "The Can of Worms Is Open-Now What?". ControlGlobal. Retrieved 14 October 2010.
- ^ a b c "Stuxnet worm is the 'work of a national government agency'". The Guardian. 24 September 2010. Retrieved 27 September 2010.
- ^ a b Markoff, John (26 September 2010). "A Silent Attack, but Not a Subtle One". New York Times. Retrieved 27 September 2010.
- ^ Stuxnet worm heralds new era of global cyberwar, guardian.co.uk, 30 September 2010
- ^ Hounshell, Blake (27 September 2010). "6 mysteries about Stuxnet". Foreign Policy. Retrieved 28 September 2010.
- ^ a b "The Stuxnet worm: A cyber-missile aimed at Iran?". The Economist. 24 September 2010. Retrieved 28 September 2010.
- ^ Falkenrath Says Stuxnet Virus May Have Origin in Israel: Video. Bloomberg Television 2010-09-24 [2]
- ^ Iran/Critical National Infrastructure: Cyber Security Experts See The Hand Of Israel's Signals Intelligence Service In The "Stuxnet" Virus Which Has Infected Iranian Nuclear Facilities, 01 September 2010. [3].
- ^ Riddle, Warren (2010-10-1). "Mysterious 'Myrtus' Biblical Reference Spotted in Stuxnet Code". SWITCHED. Retrieved 2010-10-06.
{{cite web}}
: Check date values in:|date=
(help) - ^ "SCADA Systems Whitepaper" (PDF). Motorola.
- ^ "W32.Stuxnet Dossier" (PDF). Symantec Corporation.
- ^ "Symantec Puts 'Stuxnet' Malware Under the Knife". PC Magazine.
- ^ "New Clues Point to Israel as Author of Blockbuster Worm, Or Not". Wired.
- ^ Kevon O'Brien, A Silent Attack, but Not a Subtle One, New York Times online vom 30. September 2010, see also [4]
- ^ A worm in the centrifuge:An unusually sophisticated cyber-weapon is mysterious but important. The Economist, 30 September 2010 [5]
- ^ "Stuxnet Worm a U.S. Cyber-Attack on Iran Nukes?". CBS News.
- ^ Robert McMillan (23 July 2010). "Iran was prime target of SCADA worm". Computerworld. Retrieved 17 September 2010.
- ^ a b Clayton, Mark (21 September 2010). "Stuxnet malware is 'weapon' out to destroy ... Iran's Bushehr nuclear plant?". Christian Science Monitor. Retrieved 23 September 2010.
- ^ "Serious nuclear accident may lay behind Iranian nuke chief%27s mystery resignation". wikileaks.
- ^ Clayton, Mark (25 February 2009). "Stuxnet worm mystery: What's the cyber weapon after?". Yahoo News. Retrieved 28 September 2010.
- ^ "6 mysteries about Stuxnet". Blog.foreignpolicy.com. Retrieved 28 September 2010.
- ^ Paul Woodward (22 February 1999). "Iran confirms Stuxnet found at Bushehr nuclear power plant". Warincontext.org. Retrieved 28 September 2010.
- ^ "German Cyber-Security Expert: Stuxnet's Target, Natanz Reactor". www.richardsilverstein.com. 23 September 2010. Retrieved 2 October 2010.
- ^ The Stuxnet Outbreak; A worm in the Centrifuge, The Economist 2 October 2010
- ^ Mills, Elinor. "Expert: Stuxnet was built to sabotage Iran nuclear plant". News.cnet.com. Retrieved 28 September 2010.
- ^ "Was Stuxnet Built to Attack Iran's Nuclear Program?". Pcworld.com. 21 September 2010. Retrieved 28 September 2010.
- ^ "Signs of sabotage in Tehran's nuclear programme". Gulf News. 14 July 2010.
- ^ Reuters (7 July 2009). "Wary of naked force, Israel eyes cyberwar on Iran". Retrieved 27 September 2010.
{{cite news}}
:|author=
has generic name (help) - ^ "Under cyber-attack, says Iran". The Hindu.
- ^ Peter Beaumont (26 September 2010). "Iran nuclear experts race to stop spread of Stuxnet computer worm". The Guardian. Retrieved 28 September 2010.
- ^ "Stuxnet worm hits Iran nuclear plant staff computers". BBC News. 26 September 2010. Retrieved 28 September 2010.
- ^ "Computer worm infects Iran's nuclear station". The Daily Telegraph. Retrieved 28 September 2010.
- ^ Daivd Sanger (25 September 2010). "Iran Fights Malware Attacking Computers". New York Times. Retrieved 28 September 2010.
- ^ "شبکه خبر :: راه های مقابله با ویروس"استاکس نت"" (in Iranian). Irinn.ir. Retrieved 28 September 2010.
{{cite web}}
: CS1 maint: unrecognized language (link) - ^ a b "Stuxnet worm rampaging through Iran: IT official". AFP. Archived from the original on 28 September 2010.
- ^ "IRAN: Speculation on Israeli involvement in malware computer attack". Los Angeles Times. 27 September 2010. Retrieved 28 September 2010.
- ^ a b "Iran struggling to contain 'foreign-made' 'Stuxnet' computer virus". Washington Post. 27 September 2010. Retrieved 28 September 2010.
External links
- Siemens - Industry Automation and Drive Technologies - Service& Support - SIMATIC WinCC / SIMATIC PCS 7: Information concerning Malware / Virus / Trojan
- Stuxnet Under the Microscope, an analysis of Stuxnet white paper, ESET
- Security analysis of Stuxnet
- Exploring Stuxnet's PLC Infection Process, Symantec
- Super Nuclear Worm Invades Kazakhstan - Hollywood Salivates
- Stuxnet Questions and Answers, F-Secure
- Stuxnet: Fact vs. theory by Elinor Mills for CNET News October 5, 2010
- Stuxnet: Cyber Attack on Iran - PressTV video
- Siemens - Totally Integrated Automation - "Building a Cyber Secure Plant"
- Siemens - Totally Integrated Automation - "Safeguard Networks from Cyber Security Breaches"