Stuxnet is a computer virus designed to attack the industrial system appeared widely. Stuxnet so-called security experts as a form of cyber weapons are a means of terrorism in cyberspace. The attacks not only on the victim's computer to steal information, but took over the machine-based control system.
How Stuxnet Work?
* Viruses are malicious software, or malware, which generally attack the industrial control system made by the German company Siemens. Experts say the virus could be used to spy or sabotage.
* Siemens said the malware spread via a USB thumb drive storage device that is infected, take advantage of vulnerabilities in Microsoft Corp's Windows operating system.
* Program software Malware attack through the Supervisory Control and Data Acquisition, or SCADA. The system used to monitor the power plant automatically - from food and chemical facilities to power plants.
* Analysts said the attackers would deploy Stuxnet via thumb drives because many SCADA systems are not connected to the Internet, but it has a USB port.
* Once the worm infects a system, quickly and establish communication with the server computer so that attackers can use to steal corporate data or control the SCADA system, said Randy Abrams, a researcher with ESET, a private security firm that has studied Stuxnet.
Who is the Creator?
* Siemens, Microsoft and security experts have been studying worms and have not determine who makes it.
* Mikka Hypponen, head of research at security software firm F-Secure in Finland believe it is an attack sponsored by a state. Stuxnet very complex and "apparently carried out by groups with financial and technological support seriously."
* Ralph Langner, German experts say cyber attacks carried out by highly qualified experts, perhaps the nation state. "This is not a hacker who sits in the basement of his parents' house. On his website, www.langner.com / en / index.htm, Langner said the investigation eventually" focus "on the attacker." The attacker must know this. My conclusion is, they do not care, they are not afraid to go to jail. "
Where Distributed?
A study of the spread of technology Stuxnet by U.S. companies Symnatec shows that countries affected by the primary on August 6, is Iran with 62,867 infected computers, Indonesia with 13,336, India with 6552, the United States by 2913, Australia in 2436, the United Kingdom by 1038 , Malaysia in 1013 and Pakistan with 993. This report continues to change with the spread.
Stuxnet Forms of Terrorism in Cyber World
Some internet security expert suggests Stuxnet is the only sophisticated malware attack that is supported by a large cost, highly skilled team of attackers, and a good knowledge of SCADA technology.
Kaspersky likens Stuxnet like opening Pandora's Box. "This malicious program is not designed to steal money, send spam, or retrieve personal data, do not, this type of malware is designed to sabotage the buildings, to damage the industrial system," said Eugene Kaspersky.
The main purpose of this worm is to access the Simatic WinCC SCADA, which is used as an industrial control system and the duty to supervise and control the industrial, infrastructure, or facilities-based processes. Similar systems are widely used in oil refineries, power plants, large communication systems, airports, shipping, and even military installations globally.
Targeted attacks and regions plagued by this worm (especially Iran), implying that they are not the usual group of cyber criminals. Furthermore, Kaspersky security expert who analyzed the worm code confirms that the main goal Stuxnet not to spy on the infected system, but to conduct sabotage. All the above facts seem to indicate the development Stuxnet supported by a state, which has a strong intelligence data.
Stuxnet Maybe Funded Government or Private Institutions
Based on the observations of the researchers, the possibility of parties who are behind the manufacture Stuxnet worm is the government or a wealthy private institution. Worm ins consist of complex computer programs that require a variety of construction skills. This worm is very sophisticated, very large funded and not many groups that can launch this threat.
Symantec Experts estimate the project will require 5 to 10 people within six months. In addition, the knowledge needed industrial control systems and access to the system to perform quality testing, again this mengindikaskan that this is a project that is very organized and has a large fund.
Source: www.bangzabar.com 
 
No comments:
Post a Comment