Search Disaster Preparedness Blog

« Autofill Bug In Safari Exposes Personal Information | Main | Always Remember - Never Forget »
Monday
Sep272010

Cyber Warfare Takes Another Possible Leap Forward, Stuxnet Worm Infecting SCADA Systems and Hit’s Iranian Nuclear Facilities Hard 

Many people (most security experts aside) who work with industrial SCADA (Supervisory Control and Data Acquisition) and PLC (Programmable Logic Controllers) systems have long considered these systems safe. In fact if you check the reference sources at the bottom, you will notice a recurring theme of, if you asked me if this was possible last week, I would have said no.

I have personally had people tell me they are safe from these kinds of threats because they have multiple layers of firewall's and other "robust" cyber security in place. These people are wrong, and I hope this incident serves as a wakeup call to others who work with these systems everyday. Bottom line - All systems are vulnerable.

A worm known as Stuxnet has infected systems from several countries including those of the United States, Indonesia, India, and Iran.

Iran seems to have been hit the hardest and appears to be the likely target of a coordinated attack. Iranian officals are confirming that 30,000 of their computers have been infected with the worm. Symantec is also syaing that country was the hardest hit with about 60% of the Stuxnet infections occuring in Iran.

The Stuxnet worm was first discovered in June 2010 by an anti virus firm VirusBlokAda located in Belarus and an excellent analysis of the worm was done by Langner Communication located in Germany who is calling it a direct attack and "the hack of the century" (follow this link for their complete analysis). Stuxnet has the capability to reprogram and destroy a designated infrastructure.

The worm is currently being considered a direct attack on the Iranian nuclear site at Bushehr and another unknown site by an as yet unidentified source. Of course this is currently speculation, but most likely correct.

The real question to ask after this incident whether or not it was a direct attack is, how vulnerable are we, and how do we prevent this from ever occurring here?

To read more about this incident and get the facts please check out the references below.

PrintView Printer Friendly Version

EmailEmail Article to Friend

References (23)

References allow you to track sources for this article, as well as articles that were written in response to this article.
  • Source
    "If someone had asked me in June this year whether a worm of this sophistication, which could potentially be operated remotely, was possible – I would have said absolutely no way. "But now it has been proved possible. We should be very worried indeed about this."
  • Source
    “An electronic war has been launched against Iran,” Liaii said in the report published late yesterday. “This computer worm is designed to transfer data about production lines from our industrial plants to locations outside Iran.”
  • Source
  • Source
    The Stuxnet virus is the first that aims to cause physical destruction.Kaspersky Lab, a security software company,called Stuxnet a "fearsome prototype of a cyber-weapon that will lead to the creation of a new arms race in the world". A computer virus that has infected more than 60,000 machines in Iran may be a sophisticated cyber-warfare attack on Iran's clandestine nuclear arms program, software experts have told The Times.
  • Source
    The worm targets Siemens AG software used to control industrial equipment and may be aimed at destroying Iran's controversial nuclear facility, according to Ralph Langner, a German industrial controls safety expert, the Financial Times reported. Falkenrath, speaking from Washington, talks with Deirdre Bolton on Bloomberg Television's "InsideTrack." (Source: Bloomberg)
  • Source
    Let's play... Global Thermonuclear War. The Stuxnet worm, "the most sophisticated malware ever," has been discovered infesting Iran's nuclear installations. There's growing speculation that these were indeed the intended targets of what the mainstream continues to call a "virus" -- it only infects certain Siemens SCADA systems in specific configurations. There's also speculation that it's state-sponsored malware, with fingers pointing at either Israel or the U.S
  • Source
    Since then, experts have amassed evidence that Stuxnet has been attacking SCADA systems since at least January 2010. Meanwhile, others have speculated that Stuxnet was created by a state-sponsored team of programmers, and designed to cripple Iran's Bushehr nuclear reactor. The reactor, located in southwestern Iran near the Persian Gulf, has been the focus of tension between Iran and the West, including the U.S., which believes that spent fuel from the reactor could be reprocessed into high-grad
  • Source
    SCADA systems are commonly used to manage oil rigs, power plants, water facilities, and other industrial plants. Stuxnet was first identified this summer, but the Windows vulnerability exploited by the malware was first described in April of 2009. Microsoft confirmed earlier this week that it "overlooked" the vulnerability when it was revealed last year. Two of the four vulnerabilities exploited by the worm were patched in this month's Patch Tuesday.
  • Source
  • Source
    Stuxnet has the ability to take advantage of the programming software to also upload its own code to the PLC in an industrial control system that is typically monitored by SCADA systems. In addition, Stuxnet then hides these code blocks, so when a programmer using an infected machine tries to view all of the code blocks on a PLC, they will not see the code injected by Stuxnet. Thus, Stuxnet isn’t just a rootkit that hides itself on Windows, but is the first publicly known rootkit that is able to
  • Source
    Stuxnet’s goal is to modify the behavior of an industrial control system by modifying PLCs. It does this by intercepting read/write requests sent to the PLC, determining whether the system is the intended target, modifying the existing PLC code blocks and writing new blocks to the PLC, and finally hiding the PLC infection from the PLC operator/programmer using rootkit functionality. The tasks are distinct because, for instance, the hiding of infected code blocks takes place on the infected Windo
  • Response
    Disaster Preparedness Blog - Emergency Preparedness Tips, Business Continuity and Disaster Recovery Emergency Management - DISASTER PREPAREDNESS BLOG - Cyber Warfare Takes Another Possible Leap Forward, Stuxnet Worm Infecting SCADA Systems and Hit’s Iranian Nuclear Facilities Hard
  • Response
    Disaster Preparedness Blog - Emergency Preparedness Tips, Business Continuity and Disaster Recovery Emergency Management - DISASTER PREPAREDNESS BLOG - Cyber Warfare Takes Another Possible Leap Forward, Stuxnet Worm Infecting SCADA Systems and Hit’s Iranian Nuclear Facilities Hard
  • Response
    Response: tool lock
    Disaster Preparedness Blog - Emergency Preparedness Tips, Business Continuity and Disaster Recovery Emergency Management - DISASTER PREPAREDNESS BLOG - Cyber Warfare Takes Another Possible Leap Forward, Stuxnet Worm Infecting SCADA Systems and Hit’s Iranian Nuclear Facilities Hard
  • Response
    Response: supplement shop
    Disaster Preparedness Blog - Emergency Preparedness Tips, Business Continuity and Disaster Recovery Emergency Management - DISASTER PREPAREDNESS BLOG - Cyber Warfare Takes Another Possible Leap Forward, Stuxnet Worm Infecting SCADA Systems and Hit’s Iranian Nuclear Facilities Hard
  • Response
    Response: gold backed ira
    Disaster Preparedness Blog - Emergency Preparedness Tips, Business Continuity and Disaster Recovery Emergency Management - DISASTER PREPAREDNESS BLOG - Cyber Warfare Takes Another Possible Leap Forward, Stuxnet Worm Infecting SCADA Systems and Hit’s Iranian Nuclear Facilities Hard
  • Response
    Response: small investments
    Disaster Preparedness Blog - Emergency Preparedness Tips, Business Continuity and Disaster Recovery Emergency Management - DISASTER PREPAREDNESS BLOG - Cyber Warfare Takes Another Possible Leap Forward, Stuxnet Worm Infecting SCADA Systems and Hit’s Iranian Nuclear Facilities Hard
  • Response
    Response: gold backed ira
    Disaster Preparedness Blog - Emergency Preparedness Tips, Business Continuity and Disaster Recovery Emergency Management - DISASTER PREPAREDNESS BLOG - Cyber Warfare Takes Another Possible Leap Forward, Stuxnet Worm Infecting SCADA Systems and Hit’s Iranian Nuclear Facilities Hard
  • Response
    Disaster Preparedness Blog - Emergency Preparedness Tips, Business Continuity and Disaster Recovery Emergency Management - DISASTER PREPAREDNESS BLOG - Cyber Warfare Takes Another Possible Leap Forward, Stuxnet Worm Infecting SCADA Systems and Hit’s Iranian Nuclear Facilities Hard
  • Response
    Disaster Preparedness Blog - Emergency Preparedness Tips, Business Continuity and Disaster Recovery Emergency Management - DISASTER PREPAREDNESS BLOG - Cyber Warfare Takes Another Possible Leap Forward, Stuxnet Worm Infecting SCADA Systems and Hit’s Iranian Nuclear Facilities Hard
  • Response
    Disaster Preparedness Blog - Emergency Preparedness Tips, Business Continuity and Disaster Recovery Emergency Management - DISASTER PREPAREDNESS BLOG - Cyber Warfare Takes Another Possible Leap Forward, Stuxnet Worm Infecting SCADA Systems and Hit’s Iranian Nuclear Facilities Hard
  • Response
    Disaster Preparedness Blog - Emergency Preparedness Tips, Business Continuity and Disaster Recovery Emergency Management - DISASTER PREPAREDNESS BLOG - Cyber Warfare Takes Another Possible Leap Forward, Stuxnet Worm Infecting SCADA Systems and Hit’s Iranian Nuclear Facilities Hard
  • Response
    Disaster Preparedness Blog - Emergency Preparedness Tips, Business Continuity and Disaster Recovery Emergency Management - DISASTER PREPAREDNESS BLOG - Cyber Warfare Takes Another Possible Leap Forward, Stuxnet Worm Infecting SCADA Systems and Hit’s Iranian Nuclear Facilities Hard

Reader Comments (1)

Wow...very interesting. It's crazy to think that 10 years ago cyber warfare wasn't as big of a concern as it is today. Now, we have to factor it into even the most basic continuity planning and disaster preparedness.

November 10, 2010 | Unregistered CommenterMark

PostPost a New Comment

Enter your information below to add a new comment.

My response is on my own website »
Author Email (optional):
Author URL (optional):
Post:
 
All HTML will be escaped. Hyperlinks will be created for URLs automatically.