About Me

My photo
I am an amateur writer, I love to blog and connect with people online. If I could my whole day would be spent just writing.

Sunday, September 26, 2010

Going toward Iran, experts claim, is the military services-grade cyber tool, Stuxnet

Probably the most sophisticated malware ever is what the majority are calling Stuxnet. Computer security experts throughout the world are amazed by it. They have decided sabotage is the primary goal of the Stuxnet called a search and destroy weapon. The cybersecurity experts say that only a nation-state, not a band of rogue hackers, would have the time, cash and talent to develop a worm with the complexity of Stuxnet. Info hacked typically is information on factories, power plants and water systems as Stuxnet travels. It also doesn’t travel through the internet as it is spread through thumb drives and printer spoolers instead. Iran seems to have seen this one of the most leading numerous to believe the Bushehr nuclear power plant was the target of the Stuxnet.

Is Stuxnet interested in sabotaging the Bushehr reactor?

June was the very first time Stuxnet was detected. Computer security specialists cannot determine the complexity and encryption of the thing, reports the Christian Science Monitor. Stuxnet is the only software found that can do what it can. No other program can steal specific info about power plants, electric grids, chemical plants and factories. The Monitor reports that researcher from Cybersecurity, Ralph Langler, explained that Stuxnet is meant to hit one high value target as a military-grade cyber missile. The Target, as outlined by Langer, was the Bushehr nuclear power plant in Iran. He believes the target was hit already. Bushehr’s scheduled startup in August has been delayed for unknown reasons.

Stuxnet and just how it works

About 45,000 computer systems are infected by Stuxnet worldwide. The Daily Mail explains that computer systems were hit by Stuxnet that aren’t connected to the web. They aren’t connected to the web for security purposes. USB thumb drives spread the virus to PCs running Microsoft Windows. Stuxnet starts working once the thumb drive is in. It doesn’t need any kind of clicking or keying in to start it. Stuxnet looks for any Siemens software running control systems that are industrial once in computer. After discovering the software, it reprograms it. The software gets dangerous instructions that are new. Experts say Stuxnet is capable of taking control of key processes to set off a sequence that makes an entire system self-destruct.

Cyber warfare started by Stuxnet

Alarms are hit with Stuxnet. This is because its code is so complex along with the many different techniques in it. BBC News explained that Liam O’Murchu of Symantec, discovering the worm and tracking it down, claims that Stuxnet works by spreading with new techniques never seen. The worm exploits several previously unknown, un-patched Windows vulnerabilities. The project for Stuxnet was said by O’Murchu to have been well-funded. It also had to be well-planned. Heavy insider knowledge was needed to create such a sabotage attack with Stuxnet, says Langer. ”This isn’t some hacker sitting in the basement of his parents’ house,” he explained evidently. “To me, it appears the resources needed to stage this attack point to a nation state.”

More on this topic

Christian Science Monitor

csmonitor.com/USA/2010/0921/Stuxnet-malware-is-weapon-out-to-destroy-Iran-s-Bushehr-nuclear-plant

Daily Mail

dailymail.co.uk/sciencetech/article-1314580/Stuxnet-worm-targeted-Iranian-nuclear-power-station-sophisticated-virus-attack-ever.html?ITO=1490

BBC News

bbc.co.uk/news/technology-11388018



No comments:

Post a Comment