Stuxnet Worm

In: Computers and Technology

Submitted By Geekboy
Words 2136
Pages 9
STUXNET Worm

Webster University
SECR-5080 Information Systems Security

Author Note

Certificate of Authorship: This paper was prepared by me for this specific course and is not a result of plagiarism or self-plagiarism. I have cited all sources from which I used data, ideas, or words either quoted or paraphrased.

Abstract
Discovered in June of 2010, a computer worm called Stuxnet was designed to attack programmable-logic controllers or PLCs that are used to control switches and values in industries that operate a specific type of on Siemens PLC device using Step7 software running on a Windows operating system. The worm was successful because it was able to exploit a of four zero-day flaw of Windows operating system. Stuxnet was a targeted attack by intelligence agencies to delay the enrichment of uranium by Iran. The Stuxnet worm was the first clear public evidence of sophisticated computer malware to sabotage control systems. The Stuxnet reportedly ruined almost one-fifth of Iran's nuclear centrifuges in 2010.

Table of Contents Introduction 5 Stuxnet Worm 5 Stuxnet is a Computer Virus 5 How Stuxnet Works 7 Stuxnet and PLCs 9 Stuxnet: Cyber Warfare? 9 Zero-day flaws and Stuxnet 11 Summary 12 References 14

Table of Figures Figure 1: SIEMINS S7 family of PLC (SIEMINS, n.d) 5 Figure 2: Flash Drive 5 Figure 3: Realtek Semiconductor Corp Logo (RealTek, n.d.). 6 Figure 4: Realtek Certificate (Symantec, 2010). 6 Figure 5: How STUXNET Spreads (New York Times, 2011). 7 Figure 6: Infection By Country (Symantec, 2010). 9 Figure 7: WinCC Software (Symantec, 2010). 11

Introduction
Discovered in June of 2010, a computer worm called Stuxnet, was designed to attack Power programmable-logic controllers or PLC’s used in control industrial controls such as used in nuclear power plants that operate a specific type of on…...

Similar Documents

Round Worms

...experiments on more than 10,000 tiny laboratory roundworms. The first step involved developing genetic mutants of these transparent roundworms for each one of 654 genes that were suspected to play a role in the regulation of axon regrowth in worms, fruit flies and mice. They then labeled the roundworm neurons with green fluorescent protein and, with a precise surgical laser, damaged a specific axon. Because the worms were transparent they could see the axons expressing a green fluorescent protein. By examining the re-growth, or lack of growth, of the damaged axon 24 hours later, the scientists were then able to determine which of these 654 genes were actually important to axon re-growth. The 76 genes seen are believed to have the same function in humans as in the worms. Research teams are now collaborating with other investigators to conduct experiments on mice to verify this connection and determine which of these genes are the most critically important. This article is relevant to what I am studying because it show that we as humans have so many genes cells and other parts throughout our body that do many different things and when we damage these or harm them there is a way for our body to compensate or try to fix the problem. So in the worms they are finding axons or nerve cells that could potentially cure nerve damage in our bodies. My opinion is that if scientists can find a way to regenerate nerve cells in animals that maybe someday they will be able to......

Words: 367 - Pages: 2

The Worm in the Apple

...The worm in the apple John Cheever is an American novelist, who gained his popularity as a short-story writer, for which he was awarded with Pulitzer prize for fiction. His work mostly deal with the duality oh human nature corroborated by cultural and psychological background. And his short story titled “The worm in the apple” is not an exclusion. The story unfolds very smoothly and evenly in spite of of the stirring and at the same time troubling subject of the matter. We get acquainted with the main characters – The Crutchman family “so very very happy and so temperate in all their habits and so pleased with everything that came their way”, due to the anaphoric repetition the author creates intensification, that states the problem – what in beautiful on the outside may be dreadful inside. Obviously, the theme of the work is reflected in the title of the story. The rhetorical questions (who but someone suffering from a guilt complex would want to much light to pour into the rooms?; Why be o intense about digging holes) give a detailed emotional description of the Crutchman's life. The world of things puts emphasis on their way of life and thoughts. The positive form of these questions presuppose negative answers and so it gets obvious from the very beginning that the Crutchman's problems are deep and that the extraordinary rosiness of their family fruit just conceal the gravity of the infection. John Cheever gives a psychological portray of the main characters: Helen and......

Words: 693 - Pages: 3

Guinea Worm

...Dracunculiasis the disease commonly known as Guinea Worm is caused by the parasitic worm Dracunculus Medinensis . Guinea Worm disease only occurs in 10% of the world’s poorest populations who has no access to safe drinking water or health care (CDC) . This parasitic worm is the largest of parasites affecting the human’s tissues. The risk for Dracunculiasis varies by ones sex, age, profession, and ethnicity. These differences reflect from how people’s drinking water is obtained in these countries (Medscape). Drancunculiasis is commonly found now in Southern Sudan. About the same number of men and women are equally infected. Guinea Worm is common among the ages of 15–45 years old. People in this age group are known to be farmers, herders, and water fetchers for the household. Water fetchers often affected more due to the fact that they are more likely to drink contaminated water while away from home (CDC). People become infected with Guinea worm by drinking stationary water containing copepods tiny "water fleas" that carry Guinea worm. It takes about 2 weeks to mature inside the copepods before they can infect humans. Measuring 2-3 feet in length the adult female can carry about 3 million embryos within one person (World Health Organization). This parasite migrates through the victim's subcutaneous tissues causing severe pain especially when it occurs in the joints. The worm eventually emerges causing an intense pain, blisters and ulcers accompanied by fever, nausea and......

Words: 646 - Pages: 3

Guinea Worm

...Dracunculiasis the disease commonly known as Guinea Worm is caused by the parasitic worm Dracunculus Medinensis . Guinea Worm disease only occurs in 10% of the world’s poorest populations who has no access to safe drinking water or health care. This parasitic worm is the largest of parasites affecting the human’s tissues. The risk for Dracunculiasis varies by ones sex, age, profession, and ethnicity. These differences reflect from how people’s drinking water is obtained in these countries. Drancunculiasis is commonly found now in Southern Sudan. About the same number of men and women are equally infected. Guinea Worm is common among the ages of 15–45 years old. People in this age group are known to be farmers, herders, and water fetchers for the household. Water fetchers often affected more due to the fact that they are more likely to drink contaminated water while away from home. People become infected with Guinea worm by drinking stationary water containing copepods tiny "water fleas" that carry Guinea worm. It takes about 2 weeks to mature inside the copepods before they can infect humans. Measuring 2-3 feet in length the adult female can carry about 3 million embryos within one person. This parasite migrates through the victim's subcutaneous tissues causing severe pain especially when it occurs in the joints. The worm eventually emerges causing an intense pain, blisters and ulcers accompanied by fever, nausea and vomiting. Studies show that biological factors can......

Words: 255 - Pages: 2

Mydoom Worm

...Running head: Malicious Code MyDoom Worm Daniel Stevenson 11/22/2013 ITT-Tech North Las Vegas Abstract In this paper I will be detailing the Mydoom worm and what this has done to computer systems as well as what was the steps in how to prevent or remove this hazard from your computer. MyDoom Worm No one wants a virus on their computer, especially when it means that you may be spending money to remove these nasty pests from your system. There are all sorts of things that can infect your computer from viruses, worms, rootkits that make your computer into a puppet and also malicious spam ware and malware. All of these things can wreak havoc on your network. In this paper I will tell you about a worm that still has the record for being the fastest spreading virus. This virus is known as W32.MyDoom@mm. This worm has other names but this is the one that it is most known by. The Beginning MyDoom was a worm that came to the public eye at the beginning of 2004. Finnish security company F-Secure named is the worst virus to date because of the way it quickly infested users emails and quickly attached itself to any email that was going out that had an attachment. When the worm first came into the spotlight F-Secure stated that the worm was on 20-30% of the worldwide internet traffic. Another company that screens emails for companies, MessageLabs, also stated that it had intercepted the worm more than 3.4 million times at a rate of every 1 in 12 emails at its highest. This...

Words: 809 - Pages: 4

Stuxnet Virus

...Stuxnet Virus According to counterterrorism czar Richard Clarke, Stuxnet was a weaponized malware computer worm. Stuxnet was launched in mid-2009, it did major damage to Iran’s nuclear program in 2010 and then spread to computers all over the world (Clarke, 2012). Type of Breach The Stuxnet is a computer worm, “it is a digital ghost with countless lines of code… it was able to worm its way into Iran’s nuclear fuel enrichment facility in Natanz, Iran” (Clarke, 2012). A worm is a program that spreads copies of itself through a network and a worm can also spread copies of itself as a stand-alone program (Pfleeger & Pfleeger, 2007). How the Breach Occurred On June 17, 2010, Sergey Ulasen, head of a small computer security firm called VirusBlokAda, was going his through e-mail when a report caught his attention. A computer belonging to an Iranian customer was caught in a reboot loop; it was “shutting down and restarting repeatedly despite efforts by operators to take control of it. It appeared the machine was infected with a virus” (Zetter, 2011). Ulasen’s research team got hold of the virus infecting their client’s computers. They realized it was using a “zero-day” exploit to spread (Zetter, 2011). Zero-days are the hacking world’s most potent weapons: The virus exploits vulnerabilities in software that are not yet known to the software maker or antivirus vendors. They’re also exceedingly rare; it takes considerable skill and persistence to find such vulnerabilities......

Words: 1195 - Pages: 5

Term Paper on Stuxnet

...Israeli Test on Worm Called Crucial in Iran Nuclear Delay By WILLIAM J. BROAD, JOHN MARKOFF and DAVID E. SANGER Ralph Langner, an independent computer security expert, solved Stuxnet. The Dimona complex in the Negev desert is famous as the heavily guarded heart of Israel’s never-acknowledged nuclear arms program, where neat rows of factories make atomic fuel for the arsenal. Over the past two years, according to intelligence and military experts familiar with its operations, Dimona has taken on a new, equally secret role — as a critical testing ground in a joint American and Israeli effort to undermine Iran’s efforts to make a bomb of its own. Behind Dimona’s barbed wire, the experts say, Israel has spun nuclear centrifuges virtually identical to Iran’s at Natanz, where Iranian scientists are struggling to enrich uranium. They say Dimona tested the effectiveness of the Stuxnet computer worm, a destructive program that appears to have wiped out roughly a fifth of Iran’s nuclear centrifuges and helped delay, though not destroy, Tehran’s ability to make its first nuclear arms. “To check out the worm, you have to know the machines,” said an American expert on nuclear intelligence. “The reason the worm has been effective is that the Israelis tried it out.” Though American and Israeli officials refuse to talk publicly about what goes on at Dimona, the operations there, as well as related efforts in the United States, are among the newest and strongest clues......

Words: 2875 - Pages: 12

The Worm in the Apple

...The worm in the apple John Cheever is an American novelist, who gained his popularity as a short-story writer, for which he was awarded with Pulitzer prize for fiction. His work mostly deal with the duality oh human nature corroborated by cultural and psychological background. And his short story titled “The worm in the apple” is not an exclusion. The story unfolds very smoothly and evenly in spite of of the stirring and at the same time troubling subject of the matter. We get acquainted with the main characters – The Crutchman family “so very very happy and so temperate in all their habits and so pleased with everything that came their way”, due to the anaphoric repetition the author creates intensification, that states the problem – what in beautiful on the outside may be dreadful inside. Obviously, the theme of the work is reflected in the title of the story. The rhetorical questions (who but someone suffering from a guilt complex would want to much light to pour into the rooms?; Why be o intense about digging holes) give a detailed emotional description of the Crutchman's life. The world of things puts emphasis on their way of life and thoughts. The positive form of these questions presuppose negative answers and so it gets obvious from the very beginning that the Crutchman's problems are deep and that the extraordinary rosiness of their family fruit just conceal the gravity of the infection. John Cheever gives a psychological portray of the main characters: Helen......

Words: 339 - Pages: 2

Stuxnet

...pressure to establish rules of governance in cyber space. The following essay will be concerned with the Stuxnet worm and its role in Operation Olympic Games, which targeted the Iranian nuclear power plant Natanz. The analyses will provide an overview of the attack, including technical comprehension of the attack, and also looks at the attack in term of its political consequences. The first section will discuss the origins of the attack, building on Ralph Langner’s article published in ‘IEEE Software’. Even though numerous cyber offences took place before, it will explain what made Stuxnet stand out. The second part of the essay analyses the political perspective of the attack and two competing theories explaining the presence of malware in the nuclear facilities. The following section analyses the role of cyber warfare as viable military strategy. It will be argued that cyber offences appear to be more applicable as an offensive rather than defensive strategy, due to the attacker’s advantage. The last part of the essay will discuss if it is possible to prevent an advanced persistent attack like Stuxnet. Origins of the attacks Since the 1980’s, Iran’s nuclear power program has been continuously questioned by the International Energy Agency as well as the United Nations and the international community; mainly the U.S and Israel. The discovery of the computer worm in the Iranian nuclear power plant facility challenged the perception of cyber capabilities in the......

Words: 2431 - Pages: 10

Worm Hole

...alter or destroy the data being exchanged in the network there by disrupting the normal functioning of the network. Active attacks can be internal or external. External attacks are carried out by nodes that do not belong to the network. Internal attacks are from compromised nodes that are part of the network. Since the attacker is already part of the network, internal attacks are more severe and hard to detect than external attacks. Active attacks, whether carried out by an external advisory or an internal compromised node involves actions such as impersonation, modification, fabrication and replication. Layer | Types of Attack | Application | Malicious code, Data corruption, viruses and worms | Transport | Session hijacking attack, SYN Flooding Attack | Network | Black hole, Worm Hole, sinkhole, link spoofing, rushing aaaaaaaa aaaaaaaa aattack, replay attack, Sybil attack etc.spoofing, rushing attack, replay attack, Sybil attack etc. | Data link | Selfish misbehaviour, malicious behaviour, traffic analysis. | Physical | Eavesdropping, jamming, active interference. | Table 1:Classification of Attacks 3. WORMHOLE ATTACK The wormhole attack is one of the most efficient attacks, which can be executed within MANET. There are two collaborating attackers should establish the wormhole link connection via a direct low-latency communication link between two separated distant points......

Words: 3336 - Pages: 14

Cis 462 Case Study 2: Scada Worm

...CIS 462 Case Study 2: SCADA Worm Follow Below Link to Download Tutorial http://homeworklance.com/downloads/cis-462-case-study-2-scada-worm/ For More Information Visit Our Website ( http://homeworklance.com/ ) Email us At: Support@homeworklance.com or lancehomework@gmail.com Case Study 2: SCADA Worm Due Week 6 and worth 100 points Protecting the nation’s critical infrastructure is a major security challenge within the U.S. Likewise, the responsibility for protecting the nation’s critical infrastructure encompasses all sectors of government, including private sector cooperation. Search on the Internet for information on the SCADA Worm, such as the article located at http://www.theregister.co.uk/2010/09/22/stuxnet_worm_weapon/. Write a three to five (3-5) page paper in which you: 1. Describe the impact and the vulnerability of the SCADA / Stuxnet Worm on the critical infrastructure of the United States. 2. Describe the methods to mitigate the vulnerabilities, as they relate to the seven (7) domains. 3. Assess the levels of responsibility between government agencies and the private sector for mitigating threats and vulnerabilities to our critical infrastructure. 4. Assess the elements of an effective IT Security Policy Framework, and how these elements, if properly implemented, could prevent or mitigate and attack similar to the SCADA / Stuxnet Worm. 5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites......

Words: 425 - Pages: 2

Cis 462 Case Study 2: Scada Worm

...CIS 462 Case Study 2: SCADA Worm Follow Below Link to Download Tutorial http://homeworklance.com/downloads/cis-462-case-study-2-scada-worm/ For More Information Visit Our Website ( http://homeworklance.com/ ) Email us At: Support@homeworklance.com or lancehomework@gmail.com Case Study 2: SCADA Worm Due Week 6 and worth 100 points Protecting the nation’s critical infrastructure is a major security challenge within the U.S. Likewise, the responsibility for protecting the nation’s critical infrastructure encompasses all sectors of government, including private sector cooperation. Search on the Internet for information on the SCADA Worm, such as the article located at http://www.theregister.co.uk/2010/09/22/stuxnet_worm_weapon/. Write a three to five (3-5) page paper in which you: 1. Describe the impact and the vulnerability of the SCADA / Stuxnet Worm on the critical infrastructure of the United States. 2. Describe the methods to mitigate the vulnerabilities, as they relate to the seven (7) domains. 3. Assess the levels of responsibility between government agencies and the private sector for mitigating threats and vulnerabilities to our critical infrastructure. 4. Assess the elements of an effective IT Security Policy Framework, and how these elements, if properly implemented, could prevent or mitigate and attack similar to the SCADA / Stuxnet Worm. 5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites......

Words: 425 - Pages: 2

Worms

...Bio 54 2002 Filarial Worms I : Structure, Infection, & Disease Andrew G. Campbell, Ph.D. Parasitic Filarial Worms - Background • Thread-like worms transmitted by insect vectors (flies and mosquitoes) • collectively infect AT LEAST 100 million worldwide • considered major obstacles to development in endemic countries • "major players" – Wuchereria bancrofti / Brugia malayi lymphatic filariasis – Onchocerca volvulus - river blindness – Loa loa - loaiasis 1 Today’s Lecture •Taxonomy •Lymphatic Filariae •Nonlymphatic Filariae •Disease •Diagnosis, Treatment, & Control KINGDOM PHYLUM CLASS ORDER FAMILY GENUS/SPECIES Wuchereria bancrofti Brugia malayi ANIMALIA NEMATODA RHABDITAE SPIRURIDA ONCHOCERCIDAE Onchocerca volvulus Loa loa (Dirofilaria immitis) NONLYMPHATIC LYMPHATIC 2 Lymphatic Filariae • Wuchereria bancrofti – Approximately 600 million individuals are exposed with at least 80 million currently infected. – disease caused often referred to as Bancroftian filariasis. – occurs throughout the tropics, especially in Africa, South America, India, and Southeast Asia – has also been found in parts of Europe, Nile Valley and Australia • Brugia malayi – limited mostly to parts of India and Southeast Asia – infects probably less than 10 million The Global Distribution of Lymphatic Filariasis 3 Major Life Cycle Stages • INFECTIOUS LARVAE - transmitted to humans by mosquito bites • ADULT WORM - develop from larvae, reside in the......

Words: 917 - Pages: 4

Worms

...Bio 54 2002 Filarial Worms I : Structure, Infection, & Disease Andrew G. Campbell, Ph.D. Parasitic Filarial Worms - Background • Thread-like worms transmitted by insect vectors (flies and mosquitoes) • collectively infect AT LEAST 100 million worldwide • considered major obstacles to development in endemic countries • "major players" – Wuchereria bancrofti / Brugia malayi lymphatic filariasis – Onchocerca volvulus - river blindness – Loa loa - loaiasis 1 Today’s Lecture •Taxonomy •Lymphatic Filariae •Nonlymphatic Filariae •Disease •Diagnosis, Treatment, & Control KINGDOM PHYLUM CLASS ORDER FAMILY GENUS/SPECIES Wuchereria bancrofti Brugia malayi ANIMALIA NEMATODA RHABDITAE SPIRURIDA ONCHOCERCIDAE Onchocerca volvulus Loa loa (Dirofilaria immitis) NONLYMPHATIC LYMPHATIC 2 Lymphatic Filariae • Wuchereria bancrofti – Approximately 600 million individuals are exposed with at least 80 million currently infected. – disease caused often referred to as Bancroftian filariasis. – occurs throughout the tropics, especially in Africa, South America, India, and Southeast Asia – has also been found in parts of Europe, Nile Valley and Australia • Brugia malayi – limited mostly to parts of India and Southeast Asia – infects probably less than 10 million The Global Distribution of Lymphatic Filariasis 3 Major Life Cycle Stages • INFECTIOUS LARVAE - transmitted to humans by mosquito bites • ADULT WORM - develop from larvae, reside in the......

Words: 917 - Pages: 4

Worms

...ABSTRACT This minor research report is about the computer worm which is a self-navigating malicious program that is being utilized by many attackers to damage the target machine substantially. This report begins by giving an idea of what exactly is computer worm, then we discuss about the mechanism which this malicious code uses to attack the target machine, then we discuss about the various worms which have been discover and design till now, an overview is given about this worm infects the system and the exten to which these worms have cause damage. After that we discuss various prevention tools which are design to detect and eliminate such worms. In the end we discuss about the future potential worms and predicted what kind code will be written and how much damage it can cause to system or network. INTRODUCTION Everyone, almost everyone and every big organization like bank, pharmaceutical companies, and retail chain companies uses computer these days to do most of the important work so it is understood that their computer will contain certain sensitive information which they do not want to disclose, and as result such kind of information need security, and the term information security was introduced. In this minor research paper we discuss about one malicious code which is a serious threat to such information called WORM. A computer worm is a kind of malicious program which has the capability of reproducing itself and uses computer network to distribute......

Words: 2891 - Pages: 12