Newsletters
The Enterprise Security Supersite NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Please click for more information, or scroll down to pass the ad, or Close Ad.
Home Network Security Viruses & Malware Hackers Security Solutions More Topics...
Eliminate costly downtime!
Find out how with Free White Paper
& enter to win a Samsung Galaxy Note

www.apc.com
Viruses & Malware
Fiercely productive scanners
Average Rating:
Rate this article:  
Stuxnet Discovered To Contain Two Stealth Weapons
Stuxnet Discovered To Contain Two Stealth Weapons

By Jennifer LeClaire
November 21, 2013 1:52PM

Bookmark and Share
“I would use the rough analogy that instead of cutting someone's brakes, you're making the accelerator stick,” he said. “This kind of action is a paradigm shift from most of the exploits that we see which typically try to break something. Anyone with a thorough understanding of the target can potentially use it against itself.”
 

Related Topics

Malware
Security
Virus
Worm


The Stuxnet virus that damaged Iran’s Natanz nuclear facility was worse than we thought. In fact, Ralph Langner, a cyber security expert, described it as “far more dangerous than the cyberweapon that is now lodged in the public’s imagination.”

Claimed by some to be a joint project between the U.S. and Israel, Stuxnet garnered worldwide attention when it destroyed about a fifth of Iran’s nuclear centrifuges. But according to Langner the story behind the story is that Stuxnet is not really one weapon, but there exist two versions of the virus.

“The vast majority of the attention has been paid to Stuxnet's smaller and simpler attack routine -- the one that changes the speeds of the rotors in a centrifuge, which is used to enrich uranium,” Langner wrote in Foreign Policy magazine. “But the [older version of Stuxnet] is about an order of magnitude more complex and stealthy.”

An Opening Salvo

It is now known that in 2007, an older version of Stuxnet, dubbed Stuxnet Mark I, targeted the gas valves in the Iranian nuclear reactor. By contrast, the second version of Stuxnet, which was reported in 2010, targeted the reactors' cores.

According to Langner, the first and largely forgotten version of the virus qualifies as nightmare for those who understand industrial control system security. And strangely, he said, this more sophisticated attack came first while the more familiar routine followed only years later -- and was discovered in comparatively short order.

We caught up with John Shier, a senior security advisor at Sophos, to get his reaction to the report. He told us Langner talks about Stuxnet as being the opening salvo in cyberwar -- and he couldn't agree more. While technology has been used in the past as part of larger and more traditional military campaigns, he said, Stuxnet is the most successful, purpose-built cyber weapon that we know of. And it also won't be the last.

“Whatever the reason for its eventual spread -- Langner posits this is due in part to contractors working at different customers and 'manually' spreading the malware versus exhibiting worm-like behaviour -- Stuxnet had some very serious unintended consequences, namely: Duqu and Flame,” Shier said. “Once the Stuxnet code was 'in the wild', portions of it became further weaponized and used to spawn new malware families targeting non-political assets. We don't need this kind of help from our own side.”

A Scary Proposition

Shier noted another interesting point from the report -- Stuxnet didn't necessarily exploit vulnerabilities so much as features. As he sees it, this is a scary proposition insofar as the weapon didn't rely entirely on novel discoveries but turned the system on itself.

“I would use the rough analogy that instead of cutting someone's brakes, you're making the accelerator stick,” he said. “This kind of action is a paradigm shift from most of the exploits that we see which typically try to break something. Anyone with a thorough understanding of the target can potentially use it against itself.”

Overall, Shier said, the report provides interesting insight into one of the most publicized cyber weapons to date. He said he thinks the conclusion that Stuxnet has given de facto 'permission' and motivation for other nation states to attempt their own version isn't entirely unfounded.

“I also think that it provided many nation states with a handy blueprint on how to do it well,” Shier said. “Whatever the long term impact, Stuxnet will always be remembered as a turning point in what was to be an eventual progression of the militarization of technology.”
 

Tell Us What You Think
Comment:

Name:

Rohit Chatterjee:

Posted: 2013-11-24 @ 7:57pm PT
It makes the system turn on itself? By accelerating existing operations? Sounds like a cancer.



APC has an established a reputation for solid products that virtually pay for themselves upon installation. Who has time to spend worrying about system downtime? APC makes it easy for you to focus on business growth instead of business downtime with reliable data center systems and IT solutions. Learn more here.


 Viruses & Malware
1.   Malware Targets Facebook Users
2.   OpenSSL Calls for More Support
3.   How, Why Heartbleed Got Its Name
4.   Android Apps Mine Virtual Currency
5.   Spyware Targets U.S. and Europe


advertisement
Malware Targets Facebook Users
iBanking app spys on communications.
Average Rating:
Android Apps Mine Virtual Currency
Malware drains mobile phone battery.
Average Rating:
OpenSSL Calls for More Support
To find, fix problems like Heartbleed.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Heartbleed Could Cost Millions, Could Have Been Prevented
Early estimates of Heartbleed’s cost to enterprises are running in the millions. The reason: revoking all the SSL certificates the bug exposed will come at a very hefty price. Some say it all could have been avoided.
 
Michaels Says Nearly 3M Credit, Debit Cards Breached
Arts and crafts retail giant Michaels Stores has confirmed that a data breach at its POS terminals from May 2013 to Jan. 2014 may have exposed nearly 3 million customer credit and debit cards.
 
Google's Street View Software Unravels CAPTCHAs
The latest software Google uses for its Street View cars to read street numbers in images for Google Maps works so well that it also solves CAPTCHAs, those puzzles designed to defeat bots.
 

Enterprise Hardware Spotlight
Vaio Fit 11A Battery Danger Forces Recall by Sony
Using a Sony Vaio Fit 11A laptop? It's time to send it back to Sony. In fact, Sony is encouraging people to stop using the laptop after several reports of its Panasonic battery overheating.
 
Continued Drop in Global PC Shipments Slows
Worldwide shipments of PCs fell during the first three months of the year, but the global slump in PC demand may be easing, with a considerable slowdown from last year's drops.
 
Google Glass Finds a Home in Medical Education, Practice
The innovative headpiece may find its niche in markets where hands-free access to data can be a big advantage. Glass experiments for doctors are already under way, with some promising results.
 

Mobile Technology Spotlight
Review: Siri-Like Cortana Fills Windows Phone Gap
With the new Cortana virtual assistant, Windows catches up with Apple's iOS and Google's Android in a major way, taking some of the best parts of Apple's and Google's virtual assistants, with new tools too.
 
With Galaxy S5, Samsung Proves Less Can Be More
Samsung has produced the most formidable rival yet to the iPhone 5s: the Galaxy S5. The device is the fifth edition of the company's successful line of Galaxy S smartphones, and shows less can be more.
 
Facebook Rolls Out Potentially Intrusive Location-Sharing
Looking for friends? Facebook users in the U.S. will soon be able to see which of their friends are nearby, using a smartphone's GPS. Could be a cool feature in some cases, or way too much information.
 

Navigation
Enterprise Security Today
Home/Top News | Network Security | Viruses & Malware | Hackers | Security Solutions | Mobile Security | Disaster Recovery | Windows Security
Data Security | EST Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters | XML/RSS Feed

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.