Stuxnet is new and being described by numerous. The most sophisticated malware ever is probably the most common description. It is something computer security experts in the world are amazed by. They have decided sabotage is the main goal of the Stuxnet called a search and destroy weapon. Specialists at cybersecurity explain that rogue hackers could never find the time, cash and talent needed to create something as complex since the Stuxnet, clearly developed by a nation-state. Instead of spreading indiscriminately via the internet, Stuxnet migrates via thumb drives and printer spoolers to seek out a specific application used in factories, power plants and water systems. Many believe it was meant specifically to target the Bushehr nuclear power plant as Stuxnet has shown up in Iran quite a bit.
Did Stuxnet sabotage Bushehr reactor?
The first time Stuxnet showed up was in June. This was the first trace of it. The Christian Science Monitor explains the encryption of the program is very complex. In fact, computer security experts are extremely confused by it. Stuxnet is the only software discovered that can do what it can. No other program can steal specific data about power plants, electric grids, chemical plants and factories. Cybersecurity researcher Ralph Langler told the Monitor that Stuxnet is a precision, military-grade online missile deployed to seek and destroy one high value target. The Target, as outlined by Langer, was the Bushehr nuclear power plant in Iran. He believes the target was hit already. Bushehr’s scheduled startup in August has been delayed for unknown reasons.
How Stuxnet obliterates
About 45,000 computer systems have been infected by Stuxnet worldwide. The Daily Mail reports the worm targets computer systems that aren’t connected to the internet for security reasons. USB thumb drives spread the virus to PCs running Microsoft Windows. The PC doesn’t need anybody to key in any kind of code for it to work. Stuxnet works to get embedded. After that it just looks for any industrial control systems developed by Siemens. It attacks by reprogramming software to give industrial machinery new, supposedly dangerous instructions. Taking control of key processes, Stuxnet may set off a sequence. This is expected to create a self-destruct on the system.
Cyber warfare begun by Stuxnet
Because of the variety of techniques in its package and its code, Stuxnet has set off some alarms. Liam O’Murchu of Symantec talked to BBC News. He told them that Stuxnet spreads so easily as the techniques used are so unfamiliar to computers. The worm exploits various previously unknown, un-patched Windows vulnerabilities. The project for Stuxnet was said by O’Murchu to have been well-funded. It also had to be well-planned. In an analysis on his site, Langer said Stuxnet is really a directed sabotage attack involving heavy insider knowledge. ”This isn’t some hacker sitting in the basement of his parents’ house,” he explained evidently. “To me, it seems that the resources needed to stage this attack point to a nation state.”
Further reading
Christian Science Monitor
csmonitor.com/USA/2010/0921/Stuxnet-malware-is-weapon-out-to-destroy-Iran-s-Bushehr-nuclear-plant
Daily Mail
dailymail.co.uk/sciencetech/article-1314580/Stuxnet-worm-targeted-Iranian-nuclear-power-station-sophisticated-virus-attack-ever.html?ITO=1490
BBC News
bbc.co.uk/news/technology-11388018
No comments:
Post a Comment