Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Stuxnet worm 'targeted high-value Iranian assets'

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Latest Breaking News Donate to DU
 
dipsydoodle Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Sep-23-10 07:25 AM
Original message
Stuxnet worm 'targeted high-value Iranian assets'
Source: BBC News

One of the most sophisticated pieces of malware ever detected was probably targeting "high value" infrastructure in Iran, experts have told the BBC.

Stuxnet's complexity suggests it could only have been written by a "nation state", some researchers have claimed.

It is believed to be the first-known worm designed to target real-world infrastructure such as power stations, water plants and industrial units.

It was first detected in June and has been intensely studied ever since.

Read more: http://www.bbc.co.uk/news/technology-11388018
Printer Friendly | Permalink |  | Top
geckosfeet Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Sep-23-10 07:30 AM
Response to Original message
1. Be careful what you put into your USB port....
Edited on Thu Sep-23-10 07:32 AM by geckosfeet

...it infects Windows machines via USB keys - commonly used to move files around - infected with malware.

Once it has infected a machine on a firm's internal network, it seeks out a specific configuration of industrial control software made by Siemens.
Siemens factory The worm searches out industrial systems made by Siemens

Once hijacked, the code can reprogram so-called PLC (programmable logic control) software to give attached industrial machinery new instructions.

" turn on and off motors, monitor temperature, turn on coolers if a gauge goes over a certain temperature," said Mr O'Murchu.


Printer Friendly | Permalink |  | Top
 
Nihil Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Sep-23-10 10:18 AM
Response to Original message
2. I suspect a terrorist-supporting nation state was to blame ...
> Once hijacked, the code can reprogram so-called PLC (programmable logic
> control) software to give attached industrial machinery new instructions.
> "(PLCs) turn on and off motors, monitor temperature, turn on coolers if
> a gauge goes over a certain temperature," said Mr O'Murchu.
> "Those have never been attacked before that we have seen."

Yeah, just the sort of devices you *really* want to be corrupted on a
power station ...


> However, the worm has also raised eyebrows because of the complexity of the
> code used and the fact that it bundled so many different techniques into one
> payload.
>
> "There are a lot of new, unknown techniques being used that we have never seen
> before," he said These include tricks to hide itself on PLCs and USB sticks as
> well as up to six different methods that allowed it to spread.

> "It is a very big project, it is very well planned, it is very well funded,"
> he said. "It has an incredible amount of code just to infect those machines."

Well-planned, -organised & -delivered; innovative, highly complex yet working.
That's a damn sight better than anything that most people can *buy*!


> In addition, it exploited several previously unknown and unpatched
> vulnerabilities in Windows, known as zero-day exploits.
> "It is rare to see an attack using one zero-day exploit," Mikko Hypponen,
> chief research officer at security firm F-Secure, told BBC News.
> "Stuxnet used not one, not two, but four."
> He said cybercriminals and "everyday hackers" valued zero-day exploits and
> would not "waste" them by bundling so many together.

> "This is not some hacker sitting in the basement of his parents' house.
> To me, it seems that the resources needed to stage this attack point to
> a nation state,"

So, this was professionally developed for a specific purpose - the targeting
of control systems that are likely to be in "high value" infrastructure.

Wonder which particular hi-tech terrorist-supporting nation states would be
at the top of the list of suspects for this exploit then?
Printer Friendly | Permalink |  | Top
 
bananas Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Sep-23-10 10:29 AM
Response to Reply #2
4. Russian Mafia?
Maybe they want some "insurance money" from Iran?
Printer Friendly | Permalink |  | Top
 
starroute Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Sep-23-10 11:19 AM
Response to Reply #2
5. Made is Israel?
Edited on Thu Sep-23-10 11:19 AM by starroute
The Israelis have some really good programmers, and they're heavily involved in computer security. As just one example, Check Point, which produces the ZoneAlarm firewall, is headquartered in Tel Aviv.

So I think means, motive, and opportunity are all aligned here.

Printer Friendly | Permalink |  | Top
 
Gman Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Sep-23-10 04:12 PM
Response to Reply #2
16. Does anyone NOT think this is the CIA at work?
Printer Friendly | Permalink |  | Top
 
bananas Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Sep-23-10 10:27 AM
Response to Original message
3. The worm targets Siemens parts, which are used in the Bushehr nuclear facility
The article in the OP has an interesting denial:
http://www.bbc.co.uk/news/technology-11388018

<snip>

A spokesperson for Siemens, the maker of the targeted systems, said it would not comment on "speculations about the target of the virus".

He said that Iran's nuclear power plant had been built with help from a Russian contractor and that Siemens was not involved.

"Siemens was neither involved in the reconstruction of Bushehr or any nuclear plant construction in Iran, nor delivered any software or control system," he said. "Siemens left the country nearly 30 years ago."

<snip>

However, Siemans parts are apparently used in the Bushehr plant:
http://www.ynetnews.com/articles/0,7340,L-3931663,00.html

'Siemens sent equipment to Iran reactor via Russia'

German engineering giant announced cutting relations with Iran but Der Spiegel report says Frankurt Airport customs recently seized Siemens-made switches headed for Bushehr via Moscow

Published: 08.08.10, 08:16 / Israel News

Frankfurt Airport customs seized Siemens-made switches and computer modules last June in a shipment headed for Iran's Bushehr reactor via Moscow, Der Spigel reported.

<snip>

German customs inspectors said that six similar shipments have been sent since the end of 2009 containing various Siemens parts for the Iranian nuclear industry. All six shipments left Frankfurt and reached their destination in Bushehr.

<snip>


Printer Friendly | Permalink |  | Top
 
Downwinder Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Sep-23-10 11:35 AM
Response to Reply #3
6. You would have access to the control code in order to develop a worm to target it. n/t
Edited on Thu Sep-23-10 11:35 AM by Downwinder
Printer Friendly | Permalink |  | Top
 
AngryAmish Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Sep-23-10 11:40 AM
Response to Original message
7. There was a really good article yesterday in Christian Science Monitor
They figure it was US or Israeli.
Printer Friendly | Permalink |  | Top
 
Xithras Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Sep-23-10 11:43 AM
Response to Original message
8. My guess would be that it's out of Russia, Israel, or Turkey.
All three have well funded groups that would benefit from this sort of thing. There are also growing numbers of skilled programming groups in Pakistan and India that could have accomplished this.

To suggest that it could have only been written by a "nation-state" is stupid and alarmist though. I teach computer science, and I've written viruses (not for years, and as technical exercises...none of mine have ever been released). To state that a virus has to be "government funded" simply because it's complex is silly, and demonstrates how little those "researchers" actually understand the motivations of the people who write viruses nowadays.

Think about it. You're a modern virus writer, which means that you're into information theft or blackmail. You release a virus that will shut down the infrastructure of a country and cripple it, and then let it stew and spread for a few months. When the virus has sufficiently spread, you contact the government and demand a few hundred million bucks in "ransom", or threaten to set it off.

If you tried this with a nation like the U.S., France, or China, you'd set off an international manhunt and probably end up sitting in a prison cell within days. If you try this with a "pariah" nation like Iran, not only will their enforcement powers be limited, but MANY people around the world would even applaud you for it. It's the perfect target for an attack of this type. It has the money, its enforcement options are limited, and it's unlikely to get much sympathy from other governments or the world press.
Printer Friendly | Permalink |  | Top
 
Downwinder Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Sep-23-10 11:49 AM
Response to Reply #8
9. Who has access to the insider information on Siemens software?
Should at least require a nondisclosure.
Printer Friendly | Permalink |  | Top
 
Xithras Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Sep-23-10 12:10 PM
Response to Reply #9
10. You wouldn't need it.
Some of the people trying to play this up are claiming that you'd need the source, but you really wouldn't. Virus writers don't need the Windows source code to target THAT plaform, do they?

PLC programming is fairly standardized, and your local community college probably has a course teaching it. If you don't have a community college nearby, you can just Google it...there are literally HUNDREDS of sites on the web that offer tutorials and documentation on PLC programming.

Siemens is one of the biggest PLC manufacturers on the planet, and there are millions of programmers worldwide who have the knowledge needed to program and exploit them. You can buy used Siemens PLC's on Ebay for $50 to $100 to practice on. The documentation and software needed to do virtually anything with them is downloadable for free off the Internet.

I have no question that someone put a LOT of work into this, but to suggest that this could only be a government operation is silly. Computer security researchers have been screaming for DECADES about the susceptibility of our infrastructure to viruses, but have been largely ignored. Security tends to focus on desktop computers and networks. Nobody pays attention to the integrated electronics.
Printer Friendly | Permalink |  | Top
 
rayofreason Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Sep-23-10 12:20 PM
Response to Original message
11. Info on this has been circulating
http://krebsonsecurity.com/2010/07/experts-warn-of-new-windows-shortcut-flaw/#more-4045

http://volokh.com/2010/07/18/proof-that-other-countries-are-planning-cyberattacks-on-the-power-grid/

The possible Iran angle is the new thing

http://volokh.com/2010/09/22/vc-scoops-the-security-pros-by-two-months/

I'd be surprised - and pleased - if our intelligence agencies actually pulled it off and fried Iran's nuke centrifuges. But as Baker points out

"And the target of DEADF007? Uninformed speculation claims that it’s Iran’s Bushehr nuclear facility — and that the facility is already toast. If so, we’re likely to find out pretty soon."
Printer Friendly | Permalink |  | Top
 
groundloop Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Sep-23-10 12:50 PM
Response to Original message
12. Even IF this story is true, there's have to be insider knowledge to do much
I've worked with PLC's for years, I'm what you might call an expert. Maybe, just maybe a worm could be written to infect a PLC as claimed. But even after that, you'd have to know the I/O address of each piece of equpment controlled by the PLC to actually do anything. Someone would either need access to the PLC program itself, or at least electrical drawings showing the I/O addresses to really do much.

Having said all that, it is possible a worm could just go in and crash the PLC, in which case the processor card would be removed and a new processor put in it's place (which was sitting on the shelf and likely not infected).

I just really can't see this worm being much of a threat without some serious insider information.

Printer Friendly | Permalink |  | Top
 
Adsos Letter Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Sep-23-10 01:39 PM
Response to Original message
13. *cough* (computer illiterate raises hand)...
Is it possible that a virus/worm of this type could be used to cripple a nation's vital infrastructure in combination with a military attack? Water supplies, industrial output, electrical grid, etc.?
Printer Friendly | Permalink |  | Top
 
rayofreason Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Sep-23-10 02:28 PM
Response to Reply #13
14. Yes...
..in principle, depending on how much of the system uses automatic controllers whose defaults can be overridden.

For electrical grids you could destroy transformers by messing with voltage regulating software.

http://www.selinc.com/sel-487e/
Printer Friendly | Permalink |  | Top
 
Adsos Letter Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Sep-23-10 03:05 PM
Response to Reply #14
15. Thanks, rayofreason! Well, now it boils down to two prospects, I suppose...
War or Blackmail. And then there is always that unlooked for option that comes with either/or thinking (mine, in this case). Thanks for the info; I'll check out your links; try to educate myself a bit. :hi:
Printer Friendly | Permalink |  | Top
 
RamboLiberal Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Sep-24-10 11:02 AM
Response to Original message
17. Warning over malicious computer worm (Cyberwar on nuclear plant Iran?)
Source: Financial Times

A piece of highly sophisticated malicious software that has infected an unknown number of power plants, pipelines and factories over the past year is the first program designed to cause serious damage in the physical world, security experts are warning.

The Stuxnet computer worm spreads through previously unknown holes in Microsoft’s Windows operating system and then looks for a type of software made by Siemens and used to control industrial components, including valves and brakes.

Stuxnet can hide itself, wait for certain conditions and give new orders to the components that reverse what they would normally do, the experts said. The commands are so specific that they appear aimed at an industrial sector, but officials do not know which one or what the affected equipment would do.

-----

At a closed-door conference this week in Maryland, Ralph Langner, a German industrial controls safety expert, said Stuxnet might be targeting not a sector but perhaps only one plant, and he speculated that it could be a controversial nuclear facility in Iran.

Read more: http://www.ft.com/cms/s/0/e9d3a662-c740-11df-aeb1-00144feab49a.html
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Thu May 02nd 2024, 12:33 AM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Latest Breaking News Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC