One of the most sophisticated pieces of malware ever detected was probably targeting "high value" infrastructure in Iran, experts have told the BBC.
Stuxnet's complexity suggests it could only have been written by a "nation state", some researchers have claimed.
It is believed to be the first-known worm designed to target real-world infrastructure such as power stations, water plants and industrial units.
It was first detected in June and has been intensely studied ever since.
"The fact that we see so many more infections in Iran than anywhere else in the world makes us think this threat was targeted at Iran and that there was something in Iran that was of very, very high value to whomever wrote it," Liam O'Murchu of security firm Symantec, who has tracked the worm since it was first detected, told BBC News.
Some have speculated that it could have been aimed at disrupting Iran's delayed Bushehr nuclear power plant or the uranium enrichment plant at Natanz.
However, Mr O'Murchu and others, such as security expert Bruce Schneier, have said that there was currently not enough evidence to draw conclusions about what its intended target was or who had written it.
Initial research by Symantec showed that nearly 60% of all infections were in Iran. That figure still stands, said Mr O'Murchu, although India and Indonesia have also seen relatively high infection rates.
20090710_world_wide_wiretap.htm
'Rare package'
Stuxnet was first detected in June by a security firm based in Belarus, but may have been circulating since 2009.
Unlike most viruses, the worm targets systems that are traditionally not connected to the internet for security reasons.
Instead it infects Windows machines via USB keys - commonly used to move files around - infected with malware.
Once it has infected a machine on a firm's internal network, it seeks out a specific configuration of industrial control software made by Siemens.
The worm searches out industrial systems made by Siemens
The worm searches out industrial systems made by Siemens
Once hijacked, the code can reprogram so-called PLC (programmable logic control) software to give attached industrial machinery new instructions.
"[PLCs] turn on and off motors, monitor temperature, turn on coolers if a gauge goes over a certain temperature," said Mr O'Murchu.
"Those have never been attacked before that we have seen."
If it does not find the specific configuration, the virus remains relatively benign.
However, the worm has also raised eyebrows because of the complexity of the code used and the fact that it bundled so many different techniques into one payload.
"There are a lot of new, unknown techniques being used that we have never seen before," he said These include tricks to hide itself on PLCs and USB sticks as well as up to six different methods that allowed it to spread.
In addition, it exploited several previously unknown and unpatched vulnerabilities in Windows, known as zero-day exploits.
"It is rare to see an attack using one zero-day exploit," Mikko Hypponen, chief research officer at security firm F-Secure, told BBC News. "Stuxnet used not one, not two, but four."
He said cybercriminals and "everyday hackers" valued zero-day exploits and would not "waste" them by bundling so many together.
Microsoft has so far patched two of the flaws.
'Nation state'
Mr O'Murchu agreed and said that his analysis suggested that whoever had created the worm had put a "huge effort" into it.
"It is a very big project, it is very well planned, it is very well funded," he said. "It has an incredible amount of code just to infect those machines."
There have been no instances where production operations have been influenced or where a plant has failed” - Siemen's spokesperson
The worm searches out industrial systems made by Siemens
No comments:
Post a Comment