background preloader

Understanding Stuxnet

Facebook Twitter

Inside Story - A new frontier in cyber war? Mossad's Miracle Weapon: Stuxnet Virus Opens New Era of Cyber War - SPIEGEL ONLINE - News - International. The complex on a hill near an interchange on the highway from Tel Aviv to Haifa is known in Israel simply as "The Hill.

Mossad's Miracle Weapon: Stuxnet Virus Opens New Era of Cyber War - SPIEGEL ONLINE - News - International

" The site, as big as several soccer fields, is sealed off from the outside world with high walls and barbed wire -- a modern fortress that symbolizes Israel's fight for survival in the Middle East. As the headquarters of Israel's foreign intelligence agency, the Mossad, this fortress is strictly off-limits to politicians and journalists alike. Ordinarily, it is the Mossad that makes house calls, and not the other way around. The agency's strict no-visitors policy was temporarily relaxed on a Thursday in early January, when a minibus with darkened windows pulled into a parking lot in front of a nearby movie theater.

The journalists inside were asked to hand over their mobile phones and audio recorders. Delay was the new magic word. ‪Stuxnet/Windows shortcut zero-day explained - Anatomy of an Attack online - Sophos‬‏ 27C3: Adventures in analyzing Stuxnet (Bruce Dang from Microsoft) Stuxnet. Stuxnet is a computer worm[1] that was discovered in June 2010.


It was designed to attack industrial programmable logic controllers (PLCs). PLCs allow the automation of electromechanical processes such as those used to control machinery on factory assembly lines, amusement rides, or centrifuges for separating nuclear material. Exploiting four zero-day flaws,[2] Stuxnet functions by targeting machines using the Microsoft Windows operating system and networks, then seeking out Siemens Step7 software. Stuxnet reportedly compromised Iranian PLCs, collecting information on industrial systems and causing the fast-spinning centrifuges to tear themselves apart.[3] Stuxnet’s design and architecture are not domain-specific and it could be tailored as a platform for attacking modern SCADA and PLC systems (e.g. in the automobile or power plants), the majority of which reside in Europe, Japan and the US.[4]

Stuxnext (HUNGRY BEAST) Stuxnet_distribution_9_2010.gif (664×521) Next@Norton: The Dangers of Stuxnet Analyzed. Kaboom!

Next@Norton: The Dangers of Stuxnet Analyzed

That? S what can happen when Stuxnet-type threats are unleashed. A new breed of hacker is afoot. Their creation is insidious, destructive, and a harbinger of the future. Pat Gardner of Symantec explained that malware authors have switched tactics from a macro distribution model that harms many to a micro distribution using a unique model that infects less than 50 users, or just a single facility. From many to one ? In the case of Stuxnet, the target was one Iranian enrichment facility. Espionage, complicity, and probably naivety combined to pull off a James Bond scenario with potential geopolitical effect. The targeted configuration was made up of Windows PCs, the Siemens PLC, communications processors/routers, frequency converters, and finally the target ?

Ralph Langner: Cracking Stuxnet, a 21st-century cyber weapon. Israël a lancé une attaque électronique contre l'Iran. - Vue par satellite de l'emplacement de l'usine secrète d'enrichissement uranium près de Qom Reuters - Une véritable attaque a été lancée par les Iisraéliens et les Américains contre l'Iran.

Israël a lancé une attaque électronique contre l'Iran

Mais il ne s'agit pas d'une guerre comme on l’entend d’habitude avec son cortège de bombes et de morts, mais à coup de virus informatiques. La maladie se répand alors sans faire de victimes humaines. Mahmoud Alyaee, secrétaire général des serveurs informatiques industriels d’Iran, incluant les ordinateurs servant au contrôle des installations nucléaires, vient de confirmer le 25 septembre que 30.000 ordinateurs installés dans des complexes industriels classés ont été infectés par le virus Stuxnet au point de les rendre inopérants.

Stuxnet virus attack on Iranian nuclear programme: the first strike by computer? US and Israel were behind Stuxnet claims researcher. 4 March 2011Last updated at 16:55 Iran's Bushehr reactor is believed to have been on of the intended targets for Stuxnet.

US and Israel were behind Stuxnet claims researcher

Israel and the United States created the Stuxnet worm to sabotage Iran's nuclear programme, a leading security expert has claimed. Ralph Langner told a conference in California that the malicious software was designed to cripple systems that could help build an Iranian bomb. Mr Langner was one of the first researchers to show how Stuxnet could take control of industrial equipment. It is widely believed that its target was machinery used to enrich uranium. Speaking at the TED conference in Long Beach, California, Mr Langner said: "My opinion is that Mossad [Israel's intelligence agency] is involved. " However he speculated that Israel was not the main driver behind the creation of Stuxnet. "There is only one leading source, and that is the United States," said Mr Langner. Stuxnet, ou le mythe de la cyberguerre mondiale » Article » OWNI, Digital Journalism.

Largement exposé dans les médias, le virus Stuxnet aurait été conçu par un Etat cherchant à démanteler par la force le programme nucléaire iranien.

Stuxnet, ou le mythe de la cyberguerre mondiale » Article » OWNI, Digital Journalism

Ah bon? Pas si sûr. Stuxnet worm is the 'work of a national government agency' A heatmap showing the number of computers infected by the Stuxnet computer worm.

Stuxnet worm is the 'work of a national government agency'

A computer worm which targets industrial and factory systems is almost certainly the work of a national government agency, security experts told the Guardian – but warn that it will be near-impossible to identify the culprit. The "Stuxnet" computer worm, which has been described as one of the "most refined pieces of malware ever discovered", has been most active in Iran, says the security company Symantec – leading some experts to conjecture that the likely target of the virus is the controversial Bushehr nuclear power plant, and that it was created by Israeli hackers. Speaking to the Guardian, security experts confirmed that Stuxnet is a targeted attack on industrial locations in specific countries, the sophistication of which takes it above and beyond previous attacks of a similar nature.

Communications: The Production-to-Business Company. Stuxnet malware is 'weapon' out to destroy ... Iran's Bushehr nuclear plant? Cyber security experts say they have identified the world's first known cyber super weapon designed specifically to destroy a real-world target – a factory, a refinery, or just maybe a nuclear power plant.

Stuxnet malware is 'weapon' out to destroy ... Iran's Bushehr nuclear plant?

Skip to next paragraph Subscribe Today to the Monitor Click Here for your FREE 30 DAYS ofThe Christian Science MonitorWeekly Digital Edition The cyber worm, called Stuxnet, has been the object of intense study since its detection in June. As more has become known about it, alarm about its capabilities and purpose have grown. At least one expert who has extensively studied the malicious software, or malware, suggests Stuxnet may have already attacked its target – and that it may have been Iran's Bushehr nuclear power plant, which much of the world condemns as a nuclear weapons threat.

The appearance of Stuxnet created a ripple of amazement among computer security experts. Unlike most malware, Stuxnet is not intended to help someone make money or steal proprietary data. But it gets worse. Did The Stuxnet Worm Kill India’s INSAT-4B Satellite? - The Firewall - the world of security. Les va-t-en-cyberguerre débarquent » Article » OWNI, Digital Journalism.

A en croire le Pentagone, les États-Unis seraient menacés par une guerre informatique qui nécessite d'investir à fonds perdus dans des systèmes de défense.

Les va-t-en-cyberguerre débarquent » Article » OWNI, Digital Journalism

OWNI démonte les rouages de cette machine bien huilée. “Le ministre de la guerre a donné sa démission, la guerre est supprimée”. La phrase est de Jules Renard mais elle pourrait tout aussi bien être la conclusion du point presse brumeux d’un gouvernement occidental. Nous sommes en 2010, et la notion de belligérant n’a plus grand chose à voir avec les préceptes millénaires de Sun Tzu. L’armée américaine s’est officiellement retirée d’Irak, mais elle s’est officieusement embourbée en Afghanistan. Nous sommes en 2010, et l’économie américaine reste liée jusque dans l’intimité à son complexe militaro-industrialo-congressionnel, qui fortifie tout à la fois son maillage économique local et son rayonnement international. La cyberguerre est la nouvelle norme A cela, rien de très étonnant.

La cyberguerre est une guerre sans soldats. Quand Wikipedia réécrit la guerre d’Irak » Article » OWNI, Digital Journalism. Officiellement, le conflit irakien s'est terminé au mois d'août, avec le retrait des dernières troupes américaines.

Quand Wikipedia réécrit la guerre d’Irak » Article » OWNI, Digital Journalism

Mais pour les contributeurs de l'encyclopédie en ligne, un deuxième front s'ouvre dans le champ de la sémantique. “Discussions on this page may escalate into heated debate. Please try to keep a cool head when commenting here.” (“Les discussions sur cette page sont susceptibles de dégénérer. Stuxnet: How It Infects PLCs. ‪Stuxnet - Cyber Warfare‬‏