1 / 11

MalWARE : stUXNET

CPSC 420 : COMPUTER SECURITY PRINCIPLES . Somya Verma Sharad Sharma. MalWARE : stUXNET. STUXNET. A highly sophisticated computer worm that has spread through Iran, Indonesia and India was built to destroy operations at one target: possibly Iran's  Bushehr  nuclear reactor.

aldis
Download Presentation

MalWARE : stUXNET

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CPSC 420 : COMPUTER SECURITY PRINCIPLES SomyaVerma Sharad Sharma MalWARE : stUXNET

  2. STUXNET A highly sophisticated computer worm that has spread through Iran, Indonesia and India was built to destroy operations at one target: possibly Iran's Bushehr nuclear reactor

  3. Prototype encountered in June 2009 Identified correctly in July 2010 The world’s first known cyber super weapon designed specifically to destroy a real-world target • A study of the spread of Stuxnet by Symantec showed that the main affected countries were: • China 6,000,000 (unconfirmed) • Iran 62,867 • Indonesia 13,336 • India 6,552 • United States 2,913 • Australia 2,436 • Britain 1,038 • Malaysia 1,013 • Pakistan 993 • Finland 7 • Germany 5

  4. Stuxnet: It is BIG! • Exploited four zero day vulnerabilities of Windows(3/4 are now patched) • Large Size • Written in different programming languages • Digitally signed • Can update itself • Possibly took India's INSAT-4B Satellite out of action • Target oriented weapon Nation-State Behind Stuxnet!

  5. Operations: • Targets Siemens Software Systems (SCADA) • Finds out the PLC device • Injects Code

  6. Removal & Precautionary Measures: • Siemens has released a detection and removal tool for Stuxnet. • Be up to date and vigilante for patches. • Other recommendations should also be standard fare for securing any IT environment: • Don’t allow people to use servers and mission-critical systems for web browsing, email, etc. • Enforce a high level of security for contractors and support vendors, both locally and remotely. • Remove or restrict access to shared network folders. • Only allow secure remote access methods, do not allow credentials to be transmitted in clear text. • Segment your network, separate systems from each other and use ACL’s to restrict traffic between zones.

  7. “MYRTUS”: Refers to Myrtle tree, or Hadassah in Hebrew (Jewish Queen) OR • "My RTUs" — a management feature of SCADA • Number 19790509 : • refers to 19 May 09, the execution date of HabibElghanian Israel Behind Stuxnet ?

  8. Iranian reaction With over 30,000 IP Addresses affected (and increasing) Iran is baffled and bluntly blames The United States Of America and IsraelMoreover, three new versions of the virus have been recorded when attempts to clean the infected computers failed

  9. Cyber Warfare: Cold War Doctrines Needed for Cyber Warfare (October 15th) At the recent RSA Europe conference held in London, former US Homeland Security secretary Michael Chertoff has called on countries to develop doctrines to deal with cyber warfare in the same way cold war doctrines were developed for nuclear conflict. He told delegates at the conference that over 100 countries are now actively involved in cyber espionage and cyber attacks and that clear rules of engagement need to be defined. While stating that countries should be able to respond to cyber attacks "with overwhelming force," he added countries need not "respond to virtual attacks with real attacks but I do think it's important to define when and how it might be appropriate to respond. Everyone needs to understand to rules of the game." Acknowledging that attribution of attacks is difficult MrChertoff posited that countries that are victims of persistent attacks against their critical infrastructure should be permitted to incapacitate the platform used as the source of the attack, regardless of who is controlling the attack. 

  10. Questions? • Why use Windows OS for Nuclear Power Plants? • Why hook these plants to the internet? • Who can be behind the Stuxnet Virus?

More Related