Saturday 22 February 2014
On
08:12
by
Unknown
No comments
One of the most sophisticated pieces of malware ever detected was probably targeting "high value" infrastructure in Iran
Stuxnet's complexity suggests it could only have been written by a "nation state", some researchers have claimed.It is believed to be the first-known worm designed to target real-world infrastructure such as power stations, water plants and industrial units.
It was first detected in June and has been intensely studied ever since.
"The fact that we see so many more infections in Iran than anywhere else in the world makes us think this threat was targeted at Iran and that there was something in Iran that was of very, very high value to whomever wrote it," Liam O'Murchu of security firm Symantec, who has tracked the worm since it was first detected, told BBC News.
Some have speculated that it could have been aimed at disrupting Iran's delayed Bushehr nuclear power plant or the uranium enrichment plant at Natanz.
However, Mr O'Murchu and others, such as security expert Bruce Schneier, have said that there was currently not enough evidence to draw conclusions about what its intended target was or who had written it.
Initial research by Symantec showed that nearly 60% of all infections were in Iran. That figure still stands, said Mr O'Murchu, although India and Indonesia have also seen relatively high infection rates.
'Rare package' Stuxnet was first detected in June by a security firm based in Belarus, but may have been circulating since 2009.
Unlike most viruses, the worm targets systems that are traditionally not connected to the internet for security reasons.
Instead it infects Windows machines via USB keys - commonly used to move files around - infected with malware.
Once it has infected a machine on a firm's internal network, it seeks out a specific configuration of industrial control software made by Siemens.
Once hijacked, the code can reprogram so-called PLC (programmable logic control) software to give attached industrial machinery new instructions.
"[PLCs] turn on and off motors, monitor temperature, turn on coolers if a gauge goes over a certain temperature," said Mr O'Murchu.
"Those have never been attacked before that we have seen."
If it does not find the specific configuration, the virus remains relatively benign.
However, the worm has also raised eyebrows because of the complexity of the code used and the fact that it bundled so many different techniques into one payload.
"There are a lot of new, unknown techniques being used that we have never seen before," he said These include tricks to hide itself on PLCs and USB sticks as well as up to six different methods that allowed it to spread.
In addition, it exploited several previously unknown and unpatched vulnerabilities in Windows, known as zero-day exploits.
"It is rare to see an attack using one zero-day exploit," Mikko Hypponen, chief research officer at security firm F-Secure, told BBC News. "Stuxnet used not one, not two, but four."
He said cybercriminals and "everyday hackers" valued zero-day exploits and would not "waste" them by bundling so many together.
Microsoft has so far patched two of the flaws.
'Nation state' Mr O'Murchu agreed and said that his analysis suggested that whoever had created the worm had put a "huge effort" into it.
"It is a very big project, it is very well planned, it is very well funded," he said. "It has an incredible amount of code just to infect those machines."
Continue reading the main story
“Start Quote
Siemen's spokespersonThere have been no instances where production operations have been influenced or where a plant has failed”
His analysis is backed up by other research done by security firms and computer experts.
"With the forensics we now have it is evident and provable
that Stuxnet is a directed sabotage attack involving heavy insider
knowledge," said Ralph Langner, an industrial computer expert in an analysis he published on the web. "This is not some hacker sitting in the basement of his parents' house. To me, it seems that the resources needed to stage this attack point to a nation state," he wrote.
Mr Langner, who declined to be interviewed by the BBC, has drawn a lot of attention for suggesting that Stuxnet could have been targeting the Bushehr nuclear plant.
In particular, he has highlighted a photograph reportedly taken inside the plant that suggests it used the targeted control systems, although they were "not properly licensed and configured".
Mr O'Murchu said no firm conclusions could be drawn.
However, he hopes that will change when he releases his analysis at a conference in Vancouver next week.
"We are not familiar with what configurations are used in different industries," he said.
Instead, he hopes that other experts will be able to pore over their research and pinpoint the exact configuration needed and where that is used.
'Limited success' A spokesperson for Siemens, the maker of the targeted systems, said it would not comment on "speculations about the target of the virus".
He said that Iran's nuclear power plant had been built with help from a Russian contractor and that Siemens was not involved.
"Siemens was neither involved in the reconstruction of Bushehr or any nuclear plant construction in Iran, nor delivered any software or control system," he said. "Siemens left the country nearly 30 years ago."
Siemens said that it was only aware of 15 infections that had made their way on to control systems in factories, mostly in Germany. Symantec's geographical analysis of the worm's spread also looked at infected PCs.
"There have been no instances where production operations have been influenced or where a plant has failed," the Siemens spokesperson said. "The virus has been removed in all the cases known to us."
He also said that according to global security standards, Microsoft software "may not be used to operate critical processes in plants".
It is not the first time that malware has been found that affects critical infrastructure, although most incidents occur accidentally, said Mr O'Murchu, when a virus intended to infect another system accidentally wreaked havoc with real-world systems.
In 2009 the US government admitted that software had been found that could shut down the nation's power grid.
And Mr Hypponen said that he was aware of an attack - launched by infected USB sticks - against the military systems of a Nato country.
"Whether the attacker was successful, we don't know," he said.
Mr O'Murchu will present his paper on Stuxnet at Virus Bulletin 2010 in Vancouver on 29 September. Researchers from Kaspersky Labs will also unveil new findings at the same event.
Subscribe to:
Post Comments
(
Atom
)
Search
Popular Posts
-
Hello friends, today we have something special for pc beginners. We have some keyboard shortcut which will really help you to operate any ...
-
Embattled Bitcoin exchange Mt. Gox has resigned from the board of the Bitcoin Foundation, the organization that manages the crypto-curren...
-
Ultra HD, colloquially known as "4K," is the latest buzzword, and the latest push from TV manufacturers. While your next TV mig...
-
BlackBerry CEO John Chen confirmed two new phones were on their way this year. The first, codenamed "Jakarta," but known as the...
-
Amazon is developing its drone service in both Seattle (US) and Cambridge (UK) UK drone experts are being sought by Am...
-
Obidike, the leader of the warriors is sent out in the company of other warriors to fetch seven virgins with which to bury the king. Incid...
-
M icrosoft has patched a critical bug in its software that had existed for 19 years. IBM researchers discovered the flaw, which affect...
-
If BitTorrent has its way, you'll be paying for some torrented content before the end of the year thanks to the integration of BitTo...
-
New photos of Nokia’s upcoming Android handset, code named Normandy, have leaked — and rather oddly, it appears the standard Android UI...
-
Nick Statt/CNET A large part of Hyperlapse's cha...
Recent Posts
Sample Text
Blog Archive
-
▼
2014
(
367
)
-
▼
February
(
214
)
- Apple's culture of secrecy delays security respons...
- Black market lights up with 360M stolen credential...
- Why bother to text your girl when BroApp can do it...
- MTN, Globacom, Airtel fined $4m by NCC
- Bitflux wins Nigerian spectrum licence bid
- Jumia Nigeria giving away one PS4 hourly at 50% di...
- LinkedIn testing Chinese language site
- Top Bitcoin exchange MtGox goes offline
- Samsung adds biometrics to latest Galaxy smartphone
- 'Smart' toothbrush grades your brushing habits
- Bitcoin ATMs coming to the U.S.
- Feeling glum, happy, aroused? New technology can d...
- AT&T follows Verizon, offers free global texts wit...
- Apple promises to fix OS X encryption flaw 'very s...
- Quixey's mobile search lets you dig deep into apps...
- BlackBerry CEO confirms Foxconn-made Q20 and Z3 ph...
- Freescale Semiconductor's Kinetis KL03 processor...
- T-Mobile's losses widen as the carrier promotes 'U...
- Microsoft's hardware chief changes roles
- Curved Samsung Gear Fit Review
- New Movies Anywhere app streams Disney's world
- Microsoft in talks to take stake in Dailymotion, r...
- iOS security hole reportedly exposes your screen i...
- Mozilla plans '$25 smartphone' for emerging markets
- Huawei launches 'hybrid' Talkband smart device
- Xbox One price cut to match PlayStation 4
- WhatsApp will expand to voice communications in th...
- Mt. Gox resigns from Bitcoin Foundation Board
- Intel launches new Atom processors
- Broadcom aims to double Wi-Fi speeds with new 802....
- Get Password Depot password manager (Win) for free
- HTC's Desire 610 comes glad in glossy plastic, has...
- First Ubuntu phones
- SanDisk microSD cards hit 128GB
- Android-powered Nokia X great for Microsoft
- BBM to land on Windows Phone this summer
- Trace Mobile numbers or Ip-Address
- Multi Google Talk Login without any software
- 1). Start any application, say Word. Ope...
- Top 20 Tips To Keep Your System Faster
- Brief overview of Unix and Linux commands
- Increase the speed of your internet connection wit...
- HOW TO CHECK ALL PASSWORD IN FIREFOX
- ALL DOS CODES REVEALED – EVERY CODE FOR COMMAND PR...
- SOME COOL KEYBOARD SHORTCUTS FOR PC BEGINNERS
- HOW TO ENJOY WINDOWS 8 VIEW IN WINDOWS 7
- Top 10 Windows 8 tips and tricks
- Schiit Audio's tiny, but powerful $119 tube headph...
- Samsung Galaxy Tab Pro 8.4 review:
- Lie detector on the way to test social media rumours
- Security failings in Linksys and Asus home routers...
- Wurm offer Bounty for game taken offline by DDoS a...
- Stuxnet worm 'targeted high-value Iranian assets'
- South Korea to develop Stuxnet-like cyberweapons
- Netflix speeds lag for Verizon users amid dispute
- Steve Jobs may appear on U.S. postage stamp
- New app helps you fight parking tickets
- Apple security update fixes iOS vulnerability
- Fitbit halts sale of Force fitness band, issues re...
- Samsung Galaxy Gear 2 and Gear 2 Neo spied in leak...
- Google Barge to set sail for new home within a month
- BigRep 3D printer can print whole pieces of furniture
- Google's Project Tango whips up new mapping tech
- Namecheap targeted in monumental DDoS attack
- Samsung Galaxy S5: Most likely features and specs
- 5TB hard drive is here, inside LaCie's latest Thun...
- Google's Tim Bray steps down in the name of workin...
- Leaked specs paint fuller picture for HTC Desire 8
- Muvee Action Studio lets you edit your GoPro video...
- Google acquires Spider.io to combat ad fraud
- Nvidia delivers more KitKat and an LTE-equipped Te...
- Microsoft taps gamers to test next Xbox One update
- Firefox OS taps into Cordova for easier Web-app de...
- Opera: watch an ad, get free mobile Net access
- Obama's commerce secretary to petition Silicon Val...
- Airbnb makes smoke and carbon monoxide detectors m...
- Fatwa forbids Muslims from traveling to Mars
- New Fiskers will have V-8s or batteries, Wanxiang ...
- Google embarks on smart contact lenses for diabetics
- Paul Graham steps down as Y-Combinator president
- Verizon closes Vodafone deal for total control of ...
- Sprint adds Wi-Fi calling to improve voice coverage
- Amazon reportedly prepping Web TV product for March
- Nokia's Here Maps to expand to all Windows 8.1 dev...
- LinkedIn now allows you to block other members
- Supernova secrets seen in X-rays
- 3-D printing 'ink' is way too expensive
- Speculators look to cash in on Bitcoin crisis
- Blackberry boss 'outrage' at T-Mobile iPhone offer
- Malware makers 'tailor' Android threats geographic...
- Microsoft to sell $25 Xbox One Media Remote in March
- Libon to IM friends for free, even if they don't h...
- Yandex suite of free Android tools sidesteps Google
- Microsoft relaunches Office Web Apps as Office Online
- Apple eyes smart magnets to attach accessories to ...
- Another HTC One 2 leak shows new colors for handse...
- The not-so-secret appeal of Snapchat's fleeting st...
- Radiation-free cancer scans may be on the horizon
- Kazam Thunder 2 brings lightning-fast 4G LTE
- Compact, budget Liquid Z4 phone hopes to make a bi...
-
▼
February
(
214
)
Copyright © 2014 Harry Jacks All Rights Reserved. Powered by Blogger.
About Me
Copyright Text
Copyright © 2014 Harry Jacks
All Rights Reserved
All Rights Reserved
0 comments :
Post a Comment