535 online
 
Most Popular Choices
Share on Facebook 45 Printer Friendly Page More Sharing Summarizing
OpEdNews Op Eds   

The Israeli threat to global security

By       (Page 2 of 3 pages) Become a premium member to see this article and all articles as one long page.   3 comments

Paul Woodward
Message Paul Woodward

O Murchu's research also found a 21-day propagation window; in other words, the worm would migrate to other machines in a network only for three weeks before calling it quits.

Those anti-propagation measures notwithstanding, Stuxnet has spread widely. Why?

Kaspersky's [Roel] Schouwenberg [a senior antivirus researcher] believes it's because the initial attack, which relied on infected USB drives, failed to do what Stuxnet's makers wanted.

"My guess is that the first variant didn't achieve its target," said Schouwenberg, referring to the worm's 2009 version that lacked the more aggressive propagation mechanisms, including multiple Windows zero-day vulnerabilities. "So they went on to create a more sophisticated version to reach their target."

That more complex edition, which O Murchu said was developed in March of this year, was the one that "got all the attention," according to Schouwenberg. But the earlier edition had already been at work for months by then -- and even longer before a little-known antivirus vendor from Belarus first found it in June. "The first version didn't spread enough, and so Stuxnet's creators took a gamble, and abandoned the idea of making it stealthy," said Schouwenberg.

In Schouwenberg's theory, Stuxnet's developers realized their first attempt had failed to penetrate the intended target or targets, and rather than simply repeat the attack, decided to raise the ante.

"They spent a lot of time and money on Stuxnet," Schouwenberg said. "They could try again [with the USB-only vector] and maybe fail again, or they could take the risk of it spreading by adding more functionality to the worm."

O Murchu agreed that it was possible the worm's creators had failed to infect, and thus gain control, of the industrial systems running at their objective(s), but said the code itself didn't provide clear clues.

What is clear, O Murchu said in a news conference Friday morning, is that Stuxnet evolved over time, adding new ways to spread on networks in the hope of finding specific PLCs (programming logic control) hardware to hijack. "It's possible that [the attackers] didn't manage to get to all of their targets [with the earlier version]," O Murchu said. "The increased sophistication of Stuxnet in 2010 may indicate that they had not reached their target."

With the proliferation of Stuxnet, Schouwenberg said that the country or countries that created the worm may have themselves been impacted by its spread. But that was likely a calculated risk the worm's developers gladly took.

And that risk may have been quite small. "Perhaps they knew that their own critical infrastructure wouldn't be affected by Stuxnet because it's not using Siemens PLCs," Schouwenberg said.

The danger now posed by Stuxnet is not simply through its direct proliferation but by virtue of the fact that it provides a blueprint that can be adapted by other parties who would otherwise lack the resources to create malware this sophisticated from scratch.

What might have been conceived as a tool to prevent the creation of a weapon of mass destruction could itself be turned into a WMD.

The Washington Post reports:

"Stuxnet opened Pandora's box," said Ralph Langner, a German researcher whose early analysis of the worm's ability to target control systems raised public awareness of the threat. "We don't need to be concerned about Stuxnet, but about the next-generation malware we will see after Stuxnet."

Sean McGurk, director of the U.S. National Cybersecurity and Communications Integration Center at the Department of Homeland Security, said that the department posted its first report to industry recommending steps to mitigate the effects of Stuxnet on July 15. But "not even two days later," he said, a hacker Web site posted the code so that others could use it to exploit the vulnerabilities in Microsoft.

Next Page  1  |  2  |  3

(Note: You can view every article as one long page if you sign up as an Advocate Member, or higher).

Well Said 2   Supported 2   Must Read 1  
Rate It | View Ratings

Paul Woodward Social Media Pages: Facebook page url on login Profile not filled in       Twitter page url on login Profile not filled in       Linkedin page url on login Profile not filled in       Instagram page url on login Profile not filled in

I am by nature if not profession, a bricoleur. A dictionary of obscure words defines a bricoleur as � ���"someone who continually invents his own strategies for comprehending reality.� �� � In the process of doing just that I have at various times (more...)
 
Go To Commenting
The views expressed herein are the sole responsibility of the author and do not necessarily reflect those of this website or its editors.
Writers Guidelines

 
Contact AuthorContact Author Contact EditorContact Editor Author PageView Authors' Articles
Support OpEdNews

OpEdNews depends upon can't survive without your help.

If you value this article and the work of OpEdNews, please either Donate or Purchase a premium membership.

STAY IN THE KNOW
If you've enjoyed this, sign up for our daily or weekly newsletter to get lots of great progressive content.
Daily Weekly     OpEd News Newsletter

Name
Email
   (Opens new browser window)
 

Most Popular Articles by this Author:     (View All Most Popular Articles by this Author)

Meet the 19-Year-Old American Killed in the Flotilla Attack

The Israeli threat to global security

Tribal loyalty versus the integrity of the individual

Expanding secrecy and diminishing privacy in Obama's America

To View Comments or Join the Conversation:

Tell A Friend