SlideShare a Scribd company logo
1 of 12
Download to read offline
STUXNET
Stuxnet is a computer worm. It targets Siemens industrial software and equipment running
Microsoft Windows. While it is not the first time that hackers have targeted industrial systems, it
is the first discovered malware that spies on and subverts industrial systems, and the first to
include a programmable logic controller (PLC) rootkit.



Stuxnet is a large, complex piece of malware with many different components and
functionalities. Stuxnet is a threat that was primarily written to target an industrial control
system or set of similar systems. Industrial control systems are used in gas pipelines and power
plants. Its final goal is to reprogram industrial control systems (ICS) by modifying code on
programmable logic controllers (PLCs) to make them work in a manner the attacker intended
and to hide those changes from the operator of the equipment. In order to achieve this goal the
creators amassed a vast array of components to increase their chances of success. This includes
zero-day exploits, a Windows rootkit, the first ever PLC rootkit, antivirus evasion
techniques, complex process injection and hooking code, network infection routines, peer-
to-peer updates, and a command and control interface. The worm initially spreads
indiscriminately, but includes a highly specialized malware payload that is designed to target
only Siemens supervisory control and data acquisition (SCADA) systems that are configured
to control and monitor specific industrial processes. Different variants of Stuxnet targeted five
Iranian organizations, with the probable target widely suspected to be uranium enrichment
infrastructure

Stuxnet is a threat targeting a specific industrial control system likely in Iran, such as a gas
pipeline or power plant. The ultimate goal of Stuxnet is to sabotage that facility by
reprogramming programmable logic controllers (PLCs) to operate as the attackers intend them
to, most likely out of their specified boundaries.

The majority of infections were found in Iran. Stuxnet contains many features such as:

              Self-replicates through removable drives exploiting a vulnerability allowing auto-
               execution.
                Microsoft Windows Shortcut ‘LNK/PIF’ Files Automatic File Execution
               Vulnerability (BID 41732)



Hardeep Singh Bhurji                                                                        Page 1
   Spreads in a LAN through a vulnerability in the Windows Print Spooler.
               Microsoft Windows Print Spooler Service Remote Code Execution
               Vulnerability (BID 43073)
              Spreads through SMB by exploiting the Microsoft Windows Server Service
               RPC Handling Remote Code Execution Vulnerability (BID 31874).
              Copies and executes itself on remote computers through network shares.
              Copies and executes itself on remote computers running a WinCC database
               server.
              Copies itself into Step 7 projects in such a way that it automatically executes
               when the Step 7 project is loaded.
              Updates itself through a peer-to-peer mechanism within a LAN.
              Exploits a total of four unpatched Microsoft vulnerabilities, two of which are
               previously mentioned vulnerabilities for self-replication and the other two are
               escalation of privilege vulnerabilities that have yet to be disclosed.
              Contacts a command and control server that allows the hacker to download and
               execute code, including updated versions.
              Contains a Windows rootkit that hide its binaries.
              Attempts to bypass security products.


              Fingerprints a specific industrial control system and modifies code on the
               Siemens PLCs to potentially sabo• tage the system.
              Hides modified code on PLCs, essentially a rootkit for PLCs




History
The worm was at first identified by the security company VirusBlokAda in mid-June 2010.
Journalist Brian Krebs's 15 July 2010 blog posting was the first widely read report on the
worm. Its name is derived from some keywords discovered in the software.

Kaspersky Lab experts at first estimated that Stuxnet started spreading around March or April
2010, but the first variant of the worm appeared in June 2009. The second variant, with
substantial improvements, appeared in March 2010, apparently because its authors believed that
Stuxnet was not spreading fast enough; a third, with minor improvements, appeared in April
2010. The worm contains a component with a build time-stamp from 3 February 2010. In the
United Kingdom on 25 November 2010, Sky News reported that it had received information
from an anonymous source at an unidentified IT security organization that Stuxnet, or a variation
of the worm, had been traded on the black market.




Hardeep Singh Bhurji                                                                      Page 2
W32.Stuxnet Timeline


Date              Event
November          Trojan.Zlob variant found to be using the LNK vulnerability only later identified in Stuxnet.
20, 2008

April, 2009       Security magazine Hakin9 releases details of a remote code execution vulnerability in the
                  Printer Spooler service. Later identified as MS10-061.
June, 2009        Earliest Stuxnet sample seen. Does not exploit MS10-046. Does not have signed driver files.
January 25,       Stuxnet driver signed with a valid certificate belonging to Realtek Semiconductor Corps.
2010

March,            First Stuxnet variant to exploit MS10-046.
2010
June     17,      Virusblokada reports W32.Stuxnet (named RootkitTmphider). Reports that it’s using a
2010              vulnerability in the processing of shortcuts/.lnk files in order to propagate (later identified as
                  MS10-046).
July     13,      Symantec adds detection as W32.Temphid (previously detected as Trojan Horse).
2010
July     16,      Microsoft issues Security Advisory for “Vulnerability in Windows Shell Could Allow Remote
2010              Code Execution (2286198)” that covers the vulnerability in processing shortcuts/.lnk files.
                  Verisign revokes Realtek Semiconductor Corps certificate.
July     17,      Eset identifies a new Stuxnet driver, this time signed with a certificate from JMicron
2010              Technology Corp.
July     19,      Siemens report that they are investigating reports of malware infecting Siemens WinCC
2010              SCADA systems.
                  Symantec renames detection to W32.Stuxnet.
July     20,      Symantec monitors the Stuxnet Command and Control traffic.
2010
July     22,      Verisign revokes the JMicron Technology Corps certificate.
2010
August       2,   Microsoft issues MS10-046, which patches the Windows Shell shortcut vulnerability.
2010

August       6,   Symantec reports how Stuxnet can inject and hide code on a PLC affecting industrial control
2010              systems.

September         Microsoft releases MS10-061 to patch the Printer Spooler Vulnerability identified by
14, 2010          Symantec in August.
                  Microsoft report two other privilege escalation vulnerabilities identified by Symantec in
                  August.
September         Symantec presents at Virus Bulletin and releases comprehensive analysis of Stuxnet.
30, 2010




Hardeep Singh Bhurji                                                                                      Page 3
Infection Statistics
As of September 29, 2010, the data has shown that there are approximately 100,000 infected
hosts.

The following graph shows the number of unique infected hosts by country:

Infected Hosts




The following graph shows the number of infected organizations by country based on WAN IP addresses:

Infected Organizations (By WAN IP)




Hardeep Singh Bhurji                                                                                   Page 4
Looking at the percentage of infected hosts by country, shows that approximately 60% of
infected hosts are in Iran:

Geographic Distribution of Infections




Stuxnet aims to identify those hosts which have the Siemens Step 7 software installed. The
following chart shows the percentage of infected hosts by country with the Siemens software
installed.


Percentage of Stuxnet infected Hosts with Siemens Software installed




Hardeep Singh Bhurji                                                                 Page 5
Stuxnet Architecture
The heart of Stuxnet consists of a large .dll file that contains many different exports and
resources. In addition to the large .dll file, Stuxnet also contains two encrypted configuration
blocks.

The dropper component of Stuxnet is a wrapper program that contains all of the above
components stored inside itself in a section name “stub”. This stub section is integral to the
working of Stuxnet. When the threat is executed, the wrapper extracts the .dll file from the stub
section, maps it into memory as a module, and calls one of the exports.

A pointer to the original stub section is passed to this export as a parameter. This export in turn
will extract the .dll file from the stub section, which was passed as a parameter, map it into
memory and call another different export from inside the mapped .dll file. The pointer to the
original stub section is again passed as a parameter. This occurs continuously throughout the
execution of the threat, so the original stub section is continuously passed around between
different processes and functions as a parameter to the main payload. In this way every layer of
the threat always has access to the main .dll and the configuration blocks.

In addition to loading the .dll file into memory and calling an export directly, Stuxnet also uses
another technique to call exports from the main .dll file. This technique is to read an executable
template from its own resources, populate the template with appropriate data, such as which .dll
file to load and which export to call, and then to inject this newly populated executable into
another process and execute it. The newly populated executable template will load the original
.dll file and call whatever export the template was populated with.

Although the threat uses these two different techniques to call exports in the main .dll file, it
should be clear that all the functionality of the threat can be ascertained by analyzing all of the
exports from the main .dll file.



Operation
Unlike most malware, Stuxnet does little harm to computers and networks that do not meet
specific configuration requirements; "The attackers took great care to make sure that only their
designated targets were hit...It was a marksman’s job." While the worm is promiscuous, it makes
itself inert if Siemens software is not found on infected computers, and contains safeguards to
prevent each infected computer from spreading the worm to more than three others, and to erase
itself on 24 June 2012. For its targets, Stuxnet contains, among other things, code for a man-in-
the-middle attack that fakes industrial process control sensor signals so an infected system does
not shut down due to abnormal behavior. The worm consists of a layered attack against three
different systems:

Hardeep Singh Bhurji                                                                        Page 6
1. The Windows operating system,
   2. Siemens PCS 7, WinCC and STEP7 industrial software applications that run on
      Windows and
   3. One or more Siemens S7 PLCs.



Windows infection

Stuxnet attacked Windows systems using an unprecedented four zero-day attacks (plus the
CPLINK vulnerability and a vulnerability used by the Conficker worm). It is initially spread
using infected removable drives such as USB flash drives, and then uses other exploits and
techniques such as peer-to-peer RPC to infect and update other computers inside private
networks that are not directly connected to the Internet. Stuxnet is unusually large at half a
megabyte in size, and written in several different programming languages (including C and C++)
which is also irregular for malware. The Windows component of the malware is promiscuous in
that it spreads relatively quickly and indiscriminately.

The malware has both user-mode and kernel-mode rootkit capability under Windows, and its
device drivers have been digitally signed with the private keys of two certificates that were
stolen from separate companies, JMicron and Realtek, that are both located at Hsinchu Science
Park in Taiwan. The driver signing helped it install kernel-mode rootkit drivers successfully
and therefore remain undetected for a relatively long period of time. Both compromised
certificates have been revoked by VeriSign.

Two websites in Denmark and Malaysia were configured as command and control servers for
the malware, allowing it to be updated, and for industrial espionage to be conducted by
uploading information. Both of these websites have subsequently been taken down as part of a
global effort to disable the malware.



Step 7 software infection

Once installed on a Windows system Stuxnet infects project files belonging to Siemens'
WinCC/PCS 7 SCADA control software (Step 7), and subverts a key communication library
of WinCC called s7otbxdx.dll. Doing so intercepts communications between the WinCC
software running under Windows and the target Siemens PLC devices that the software is able
to configure and program when the two are connected via a data cable. In this way, the malware
is able to install itself on PLC devices unnoticed, and subsequently to mask its presence from
WinCC if the control software attempts to read an infected block of memory from the PLC
system. The malware furthermore used a zero-day exploit in the WinCC/SCADA database
software in the form of a hard-coded database password.




Hardeep Singh Bhurji                                                                   Page 7
Overview of normal communications between Step 7 and a Siemens PLC




Overview of Stuxnet hijacking communication between Step 7 software and a Siemens PLC




Hardeep Singh Bhurji                                                           Page 8
PLC infection




               Siemens Simatic S7-300 PLC CPU with three I/O modules attached




The entirety of the Stuxnet code has not yet been understood, but its payload targets only those
SCADA configurations that meet criteria that it is programmed to identify. Stuxnet requires
specific slave variable-frequency drives (frequency converter drives) to be attached to the
targeted Siemens S7-300 system and its associated modules. It only attacks those PLC systems
with variable-frequency drives from two specific vendors: Vacon based in Finland and Fararo
Paya based in Iran. Furthermore, it monitors the frequency of the attached motors, and only
attacks systems that spin between 807 Hz and 1210 Hz. The industrial applications of motors
with these parameters are diverse, and may include pumps or gas centrifuges.



Stuxnet installs malware into memory block DB890 of the PLC that monitors the Profibus
messaging bus of the system. When certain criteria are met, it periodically modifies the
frequency to 1410 Hz and then to 2 Hz and then to 1064 Hz, and thus affects the operation of the
connected motors by changing their rotational speed. It also installs a rootkit—the first such
documented case on this platform—that hides the malware on the system and masks the changes
in rotational speed from monitoring systems.




Speculations about the target and origin
Experts believe that Stuxnet required the largest and costliest development effort in malware
history. Its many capabilities would have required a team of people to program, in-depth
knowledge of industrial processes, and an interest in attacking industrial infrastructure. Eric
Byres, who has years of experience maintaining and troubleshooting Siemens systems, told

Hardeep Singh Bhurji                                                                     Page 9
Wired that writing the code would have taken many man-months, if not years. Symantec
estimates that the group developing Stuxnet would have consisted of anywhere from five to
thirty people, and would have taken six months to prepare. The Guardian, the BBC and The
New York Times all reported that experts studying Stuxnet considered that the complexity of the
code indicates that only a nation state would have the capabilities to produce it. The self-destruct
and other safeguards within the code imply that a Western government was responsible, with
lawyers evaluating the worm's ramifications.

It has been speculated that Israel and the United States may have been involved.

In May 2011, the PBS program Need To Know cited a statement by Gary Samore, White House
Coordinator for Arms Control and Weapons of Mass Destruction, in which he said, "we're glad
they [the Iranians] are having trouble with their centrifuge machine and that we – the US and its
allies – are doing everything we can to make sure that we complicate matters for them", offering
"winking acknowledgement" of US involvement in Stuxnet. According to the British Daily
Telegraph, a showreel that was played at a retirement party for the head of the Israel Defence
Forces (IDF), Gabi Ashkenazi, included references to Stuxnet as one of his operational
successes as the IDF chief of staff.



Iran as target

Ralph Langner, the researcher who identified that Stuxnet infected PLCs, first speculated
publicly in September 2010 that the malware was of Israeli origin, and that it targeted Iranian
nuclear facilities. However Langner more recently, in a TED Talk recorded in February 2011,
stated that, "My opinion is that the Mossad is involved but that the leading force is not Israel.
The leading force behind Stuxnet is the cyber superpower—there is only one; and that's the
United States." Kevin Hogan, Senior Director of Security Response at Symantec, reported that
the majority of infected systems were in Iran (about 60%), which has led to speculation that it
may have been deliberately targeting "high-value infrastructure" in Iran including either the
Bushehr Nuclear Power Plant or the Natanz nuclear facility. Langner called the malware "a
one-shot weapon" and said that the intended target was probably hit, although he admitted this
was speculation. Another German researcher, Frank Rieger, was the first to speculate that
Natanz was the target.



Natanz nuclear facilities

According to the Israeli newspaper Haaretz, experts on Iran and computer security specialists
are increasingly convinced that Stuxnet was meant "to sabotage the uranium enrichment facility
at Natanz – where the centrifuge operational capacity has dropped over the past year by 30
percent." On 23 November 2010 it was announced that uranium enrichment at Natanz had
ceased several times because of a series of major technical problems. A "serious nuclear

Hardeep Singh Bhurji                                                                        Page 10
accident" occurred at the site in the first half of 2009, which is speculated to have forced the head
of Iran's Atomic Energy Organization Gholam Reza Aghazadeh to resign. Statistics published
by the Federation of American Scientists (FAS) show that the number of enriched centrifuges
operational in Iran mysteriously declined from about 4,700 to about 3,900 beginning around the
time the nuclear incident WikiLeaks mentioned would have occurred. The Institute for Science
and International Security (ISIS) suggests in a report published in December 2010 that Stuxnet
is "a reasonable explanation for the apparent damage" at Natanz and may have destroyed up to
1000 centrifuges (10 percent) sometime between November 2009 and late January 2010. The
authors conclude:



The attacks seem designed to force a change in the centrifuge’s rotor speed, first raising the
speed and then lowering it, likely with the intention of inducing excessive vibrations or
distortions that would destroy the centrifuge. If its goal was to quickly destroy all the centrifuges
in the FEP, Stuxnet failed. But if the goal was to destroy a more limited number of centrifuges
and set back Iran’s progress in operating the FEP, while making detection difficult, it may have
succeeded, at least temporarily.


The ISIS report further notes that Iranian authorities have attempted to conceal the breakdown by
installing new centrifuges on a large scale. The virus worked by first causing an infected Iranian
IR-1 centrifuge to increase from its normal operating speed of 1,064 hertz to 1,410 hertz for 15
minutes before returning to its normal frequency. Twenty-seven days later, the virus went back
into action, slowing the infected centrifuges down to a few hundred hertz for a full 50 minutes.
The stresses from the excessive, then slower speeds, caused the aluminum centrifugal tubes to
expand, often forcing parts of the centrifuges into sufficient contact with each other to destroy
the machine. According to the Washington Post, International Atomic Energy Agency
(IAEA) cameras installed in the Natanz facility recorded the sudden dismantling and removal of
approximately 900–1000 centrifuges during the time the Stuxnet worm was reportedly active at
the plant. Iranian technicians, however, were able to quickly replace the centrifuges and the
report concluded that uranium enrichment was likely only briefly disrupted.




Iranian reaction

The Associated Press reported that the semi-official Iranian Students News Agency released a
statement on 24 September 2010 stating that experts from the Atomic Energy Organization of
Iran met in the previous week to discuss how Stuxnet could be removed from their systems.




Hardeep Singh Bhurji                                                                         Page 11
The head of the Bushehr Nuclear Power Plant told Reuters that only the personal computers
of staff at the plant had been infected by Stuxnet and the state-run newspaper Iran Daily quoted
Reza Taghipour, Iran's telecommunications minister, as saying that it had not caused "serious
damage to government systems". The Director of Information Technology Council at the Iranian
Ministry of Industries and Mines, Mahmud Liaii, has said that: "An electronic war has been
launched against Iran... This computer worm is designed to transfer data about production lines
from our industrial plants to locations outside Iran."



On 29 November 2010, Iranian president Mahmoud Ahmadinejad stated for the first time that
a computer virus had caused problems with the controller handling the centrifuges at its Natanz
facilities. According to Reuters he told reporters at a news conference in Tehran, "They
succeeded in creating problems for a limited number of our centrifuges with the software they
had installed in electronic parts."




Summary

Stuxnet represents the first of many milestones in malicious code history – it is the first to exploit
four 0-day vulnerabilities, compromise two digital certificates, and inject code into industrial
control systems and hide the code from the operator. Whether Stuxnet will usher in a new
generation of malicious code attacks towards real-world infrastructure—overshadowing the vast
majority of current attacks affecting more virtual or individual assets—or if it is a once- in-a-
decade occurrence remains to be seen.
Stuxnet is of such great complexity—requiring significant resources to develop—that few
attackers will be capable of producing a similar threat, to such an extent that we would not
expect masses of threats of similar in sophistication to suddenly appear. However, Stuxnet has
highlighted direct-attack attempts on critical infrastructure are possible and not just theory or
movie plotlines.
The real-world implications of Stuxnet are beyond any threat we have seen in the past. Despite
the exciting challenge in reverse engineering Stuxnet and understanding its purpose, Stuxnet is
the type of threat we hope to never see again.




Hardeep Singh Bhurji                                                                         Page 12

More Related Content

What's hot

How stuxnet spreads – a study of infection paths in best practice systems
How stuxnet spreads – a study of infection paths in best practice systemsHow stuxnet spreads – a study of infection paths in best practice systems
How stuxnet spreads – a study of infection paths in best practice systemsYury Chemerkin
 
Stuxnet, a malicious computer worm
Stuxnet, a malicious computer wormStuxnet, a malicious computer worm
Stuxnet, a malicious computer wormSumaiya Ismail
 
The Stuxnet Virus FINAL
The Stuxnet Virus FINALThe Stuxnet Virus FINAL
The Stuxnet Virus FINALNicholas Poole
 
A Stuxnet for Mainframes
A Stuxnet for MainframesA Stuxnet for Mainframes
A Stuxnet for MainframesCheryl Biswas
 
Mission Critical Security in a Post-Stuxnet World Part 2
Mission Critical Security in a Post-Stuxnet World Part 2Mission Critical Security in a Post-Stuxnet World Part 2
Mission Critical Security in a Post-Stuxnet World Part 2Byres Security Inc.
 
Malware freak show
Malware freak showMalware freak show
Malware freak showsr1nu
 
Review on Honeypot Security
Review on Honeypot SecurityReview on Honeypot Security
Review on Honeypot SecurityIRJET Journal
 
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...Dawn Yankeelov
 
RSAC 2021 Spelunking Through the Steps of a Control System Hack
RSAC 2021 Spelunking Through the Steps of a Control System HackRSAC 2021 Spelunking Through the Steps of a Control System Hack
RSAC 2021 Spelunking Through the Steps of a Control System HackDan Gunter
 
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor FiorimTI Safe
 
SECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITY
SECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITYSECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITY
SECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITYRisman Hatibi
 
Preventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint SecurityPreventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint SecurityIntel IT Center
 
Leone ct#2 presentation rev
Leone ct#2 presentation revLeone ct#2 presentation rev
Leone ct#2 presentation revvincentleone
 
Research Paper on Rootkit.
Research Paper on Rootkit.Research Paper on Rootkit.
Research Paper on Rootkit.Anuj Khandelwal
 

What's hot (19)

How stuxnet spreads – a study of infection paths in best practice systems
How stuxnet spreads – a study of infection paths in best practice systemsHow stuxnet spreads – a study of infection paths in best practice systems
How stuxnet spreads – a study of infection paths in best practice systems
 
Stuxnet, a malicious computer worm
Stuxnet, a malicious computer wormStuxnet, a malicious computer worm
Stuxnet, a malicious computer worm
 
The Stuxnet Virus FINAL
The Stuxnet Virus FINALThe Stuxnet Virus FINAL
The Stuxnet Virus FINAL
 
A Stuxnet for Mainframes
A Stuxnet for MainframesA Stuxnet for Mainframes
A Stuxnet for Mainframes
 
Stuxnet dc9723
Stuxnet dc9723Stuxnet dc9723
Stuxnet dc9723
 
Mission Critical Security in a Post-Stuxnet World Part 2
Mission Critical Security in a Post-Stuxnet World Part 2Mission Critical Security in a Post-Stuxnet World Part 2
Mission Critical Security in a Post-Stuxnet World Part 2
 
Malware freak show
Malware freak showMalware freak show
Malware freak show
 
Stuxnets
StuxnetsStuxnets
Stuxnets
 
Review on Honeypot Security
Review on Honeypot SecurityReview on Honeypot Security
Review on Honeypot Security
 
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
 
RSAC 2021 Spelunking Through the Steps of a Control System Hack
RSAC 2021 Spelunking Through the Steps of a Control System HackRSAC 2021 Spelunking Through the Steps of a Control System Hack
RSAC 2021 Spelunking Through the Steps of a Control System Hack
 
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
 
Effective
EffectiveEffective
Effective
 
OS-Anatomy-Article
OS-Anatomy-ArticleOS-Anatomy-Article
OS-Anatomy-Article
 
SECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITY
SECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITYSECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITY
SECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITY
 
Preventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint SecurityPreventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint Security
 
Improving SCADA Security
Improving SCADA SecurityImproving SCADA Security
Improving SCADA Security
 
Leone ct#2 presentation rev
Leone ct#2 presentation revLeone ct#2 presentation rev
Leone ct#2 presentation rev
 
Research Paper on Rootkit.
Research Paper on Rootkit.Research Paper on Rootkit.
Research Paper on Rootkit.
 

Similar to Stuxnet - A weapon of the future

Stuxnet - More then a virus.
Stuxnet - More then a virus.Stuxnet - More then a virus.
Stuxnet - More then a virus.Hardeep Bhurji
 
Optional Reading - Symantec Stuxnet Dossier
Optional Reading - Symantec Stuxnet DossierOptional Reading - Symantec Stuxnet Dossier
Optional Reading - Symantec Stuxnet DossierAlireza Ghahrood
 
The EternalBlue Exploit: how it works and affects systems
The EternalBlue Exploit: how it works and affects systemsThe EternalBlue Exploit: how it works and affects systems
The EternalBlue Exploit: how it works and affects systemsAndrea Bissoli
 
(120715) #fitalk the era of cyber sabotage and warfare (case study - stuxnet)
(120715) #fitalk   the era of cyber sabotage and warfare (case study - stuxnet)(120715) #fitalk   the era of cyber sabotage and warfare (case study - stuxnet)
(120715) #fitalk the era of cyber sabotage and warfare (case study - stuxnet)INSIGHT FORENSIC
 
(120715) #fitalk the era of cyber sabotage and warfare (case study - stuxnet)
(120715) #fitalk   the era of cyber sabotage and warfare (case study - stuxnet)(120715) #fitalk   the era of cyber sabotage and warfare (case study - stuxnet)
(120715) #fitalk the era of cyber sabotage and warfare (case study - stuxnet)INSIGHT FORENSIC
 
Exploring the Social Engineering Toolkit (Set) Using Backtrack 5R3
Exploring the Social Engineering Toolkit (Set) Using Backtrack 5R3Exploring the Social Engineering Toolkit (Set) Using Backtrack 5R3
Exploring the Social Engineering Toolkit (Set) Using Backtrack 5R3IJERA Editor
 
Talk of the hour, the wanna crypt ransomware
Talk of the hour, the wanna crypt ransomwareTalk of the hour, the wanna crypt ransomware
Talk of the hour, the wanna crypt ransomwareshubaira
 
The Dynamite of Next Generation (Y) Attack
The Dynamite of Next Generation (Y) AttackThe Dynamite of Next Generation (Y) Attack
The Dynamite of Next Generation (Y) AttackPrathan Phongthiproek
 
The Duqu 2.0: Technical Details
The Duqu 2.0: Technical DetailsThe Duqu 2.0: Technical Details
The Duqu 2.0: Technical DetailsKaspersky
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec Technology and Consulting
 
The stuxnet computer worm. harbinger of an emerging warfare capability
The stuxnet computer worm. harbinger of an emerging warfare capabilityThe stuxnet computer worm. harbinger of an emerging warfare capability
The stuxnet computer worm. harbinger of an emerging warfare capabilityYury Chemerkin
 
Spanish1.jpgSpanish2.jpgSpanish3.jpgSpanish4.jpg.docx
Spanish1.jpgSpanish2.jpgSpanish3.jpgSpanish4.jpg.docxSpanish1.jpgSpanish2.jpgSpanish3.jpgSpanish4.jpg.docx
Spanish1.jpgSpanish2.jpgSpanish3.jpgSpanish4.jpg.docxrafbolet0
 
G. Gritsai, A. Timorin, Y. Goltsev, R. Ilin, S. Gordeychik, and A. Karpin, “S...
G. Gritsai, A. Timorin, Y. Goltsev, R. Ilin, S. Gordeychik, and A. Karpin, “S...G. Gritsai, A. Timorin, Y. Goltsev, R. Ilin, S. Gordeychik, and A. Karpin, “S...
G. Gritsai, A. Timorin, Y. Goltsev, R. Ilin, S. Gordeychik, and A. Karpin, “S...qqlan
 
Stuxnet - Case Study
Stuxnet  - Case StudyStuxnet  - Case Study
Stuxnet - Case StudyAmr Thabet
 
Symantec White Paper: W32.Ramnit Analysis
Symantec White Paper: W32.Ramnit AnalysisSymantec White Paper: W32.Ramnit Analysis
Symantec White Paper: W32.Ramnit AnalysisSymantec
 

Similar to Stuxnet - A weapon of the future (20)

Malware Freak Show
Malware Freak ShowMalware Freak Show
Malware Freak Show
 
Stuxnet - More then a virus.
Stuxnet - More then a virus.Stuxnet - More then a virus.
Stuxnet - More then a virus.
 
Optional Reading - Symantec Stuxnet Dossier
Optional Reading - Symantec Stuxnet DossierOptional Reading - Symantec Stuxnet Dossier
Optional Reading - Symantec Stuxnet Dossier
 
The EternalBlue Exploit: how it works and affects systems
The EternalBlue Exploit: how it works and affects systemsThe EternalBlue Exploit: how it works and affects systems
The EternalBlue Exploit: how it works and affects systems
 
STUXNET_
STUXNET_STUXNET_
STUXNET_
 
News bytes Oct-2011
News bytes  Oct-2011News bytes  Oct-2011
News bytes Oct-2011
 
(120715) #fitalk the era of cyber sabotage and warfare (case study - stuxnet)
(120715) #fitalk   the era of cyber sabotage and warfare (case study - stuxnet)(120715) #fitalk   the era of cyber sabotage and warfare (case study - stuxnet)
(120715) #fitalk the era of cyber sabotage and warfare (case study - stuxnet)
 
(120715) #fitalk the era of cyber sabotage and warfare (case study - stuxnet)
(120715) #fitalk   the era of cyber sabotage and warfare (case study - stuxnet)(120715) #fitalk   the era of cyber sabotage and warfare (case study - stuxnet)
(120715) #fitalk the era of cyber sabotage and warfare (case study - stuxnet)
 
Analysis of rxbot
Analysis of rxbotAnalysis of rxbot
Analysis of rxbot
 
Exploring the Social Engineering Toolkit (Set) Using Backtrack 5R3
Exploring the Social Engineering Toolkit (Set) Using Backtrack 5R3Exploring the Social Engineering Toolkit (Set) Using Backtrack 5R3
Exploring the Social Engineering Toolkit (Set) Using Backtrack 5R3
 
Talk of the hour, the wanna crypt ransomware
Talk of the hour, the wanna crypt ransomwareTalk of the hour, the wanna crypt ransomware
Talk of the hour, the wanna crypt ransomware
 
The Dynamite of Next Generation (Y) Attack
The Dynamite of Next Generation (Y) AttackThe Dynamite of Next Generation (Y) Attack
The Dynamite of Next Generation (Y) Attack
 
The Duqu 2.0: Technical Details
The Duqu 2.0: Technical DetailsThe Duqu 2.0: Technical Details
The Duqu 2.0: Technical Details
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 
The stuxnet computer worm. harbinger of an emerging warfare capability
The stuxnet computer worm. harbinger of an emerging warfare capabilityThe stuxnet computer worm. harbinger of an emerging warfare capability
The stuxnet computer worm. harbinger of an emerging warfare capability
 
SCADA White Paper March2012
SCADA White Paper March2012SCADA White Paper March2012
SCADA White Paper March2012
 
Spanish1.jpgSpanish2.jpgSpanish3.jpgSpanish4.jpg.docx
Spanish1.jpgSpanish2.jpgSpanish3.jpgSpanish4.jpg.docxSpanish1.jpgSpanish2.jpgSpanish3.jpgSpanish4.jpg.docx
Spanish1.jpgSpanish2.jpgSpanish3.jpgSpanish4.jpg.docx
 
G. Gritsai, A. Timorin, Y. Goltsev, R. Ilin, S. Gordeychik, and A. Karpin, “S...
G. Gritsai, A. Timorin, Y. Goltsev, R. Ilin, S. Gordeychik, and A. Karpin, “S...G. Gritsai, A. Timorin, Y. Goltsev, R. Ilin, S. Gordeychik, and A. Karpin, “S...
G. Gritsai, A. Timorin, Y. Goltsev, R. Ilin, S. Gordeychik, and A. Karpin, “S...
 
Stuxnet - Case Study
Stuxnet  - Case StudyStuxnet  - Case Study
Stuxnet - Case Study
 
Symantec White Paper: W32.Ramnit Analysis
Symantec White Paper: W32.Ramnit AnalysisSymantec White Paper: W32.Ramnit Analysis
Symantec White Paper: W32.Ramnit Analysis
 

Recently uploaded

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 

Recently uploaded (20)

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 

Stuxnet - A weapon of the future

  • 1. STUXNET Stuxnet is a computer worm. It targets Siemens industrial software and equipment running Microsoft Windows. While it is not the first time that hackers have targeted industrial systems, it is the first discovered malware that spies on and subverts industrial systems, and the first to include a programmable logic controller (PLC) rootkit. Stuxnet is a large, complex piece of malware with many different components and functionalities. Stuxnet is a threat that was primarily written to target an industrial control system or set of similar systems. Industrial control systems are used in gas pipelines and power plants. Its final goal is to reprogram industrial control systems (ICS) by modifying code on programmable logic controllers (PLCs) to make them work in a manner the attacker intended and to hide those changes from the operator of the equipment. In order to achieve this goal the creators amassed a vast array of components to increase their chances of success. This includes zero-day exploits, a Windows rootkit, the first ever PLC rootkit, antivirus evasion techniques, complex process injection and hooking code, network infection routines, peer- to-peer updates, and a command and control interface. The worm initially spreads indiscriminately, but includes a highly specialized malware payload that is designed to target only Siemens supervisory control and data acquisition (SCADA) systems that are configured to control and monitor specific industrial processes. Different variants of Stuxnet targeted five Iranian organizations, with the probable target widely suspected to be uranium enrichment infrastructure Stuxnet is a threat targeting a specific industrial control system likely in Iran, such as a gas pipeline or power plant. The ultimate goal of Stuxnet is to sabotage that facility by reprogramming programmable logic controllers (PLCs) to operate as the attackers intend them to, most likely out of their specified boundaries. The majority of infections were found in Iran. Stuxnet contains many features such as:  Self-replicates through removable drives exploiting a vulnerability allowing auto- execution. Microsoft Windows Shortcut ‘LNK/PIF’ Files Automatic File Execution Vulnerability (BID 41732) Hardeep Singh Bhurji Page 1
  • 2. Spreads in a LAN through a vulnerability in the Windows Print Spooler. Microsoft Windows Print Spooler Service Remote Code Execution Vulnerability (BID 43073)  Spreads through SMB by exploiting the Microsoft Windows Server Service RPC Handling Remote Code Execution Vulnerability (BID 31874).  Copies and executes itself on remote computers through network shares.  Copies and executes itself on remote computers running a WinCC database server.  Copies itself into Step 7 projects in such a way that it automatically executes when the Step 7 project is loaded.  Updates itself through a peer-to-peer mechanism within a LAN.  Exploits a total of four unpatched Microsoft vulnerabilities, two of which are previously mentioned vulnerabilities for self-replication and the other two are escalation of privilege vulnerabilities that have yet to be disclosed.  Contacts a command and control server that allows the hacker to download and execute code, including updated versions.  Contains a Windows rootkit that hide its binaries.  Attempts to bypass security products.  Fingerprints a specific industrial control system and modifies code on the Siemens PLCs to potentially sabo• tage the system.  Hides modified code on PLCs, essentially a rootkit for PLCs History The worm was at first identified by the security company VirusBlokAda in mid-June 2010. Journalist Brian Krebs's 15 July 2010 blog posting was the first widely read report on the worm. Its name is derived from some keywords discovered in the software. Kaspersky Lab experts at first estimated that Stuxnet started spreading around March or April 2010, but the first variant of the worm appeared in June 2009. The second variant, with substantial improvements, appeared in March 2010, apparently because its authors believed that Stuxnet was not spreading fast enough; a third, with minor improvements, appeared in April 2010. The worm contains a component with a build time-stamp from 3 February 2010. In the United Kingdom on 25 November 2010, Sky News reported that it had received information from an anonymous source at an unidentified IT security organization that Stuxnet, or a variation of the worm, had been traded on the black market. Hardeep Singh Bhurji Page 2
  • 3. W32.Stuxnet Timeline Date Event November Trojan.Zlob variant found to be using the LNK vulnerability only later identified in Stuxnet. 20, 2008 April, 2009 Security magazine Hakin9 releases details of a remote code execution vulnerability in the Printer Spooler service. Later identified as MS10-061. June, 2009 Earliest Stuxnet sample seen. Does not exploit MS10-046. Does not have signed driver files. January 25, Stuxnet driver signed with a valid certificate belonging to Realtek Semiconductor Corps. 2010 March, First Stuxnet variant to exploit MS10-046. 2010 June 17, Virusblokada reports W32.Stuxnet (named RootkitTmphider). Reports that it’s using a 2010 vulnerability in the processing of shortcuts/.lnk files in order to propagate (later identified as MS10-046). July 13, Symantec adds detection as W32.Temphid (previously detected as Trojan Horse). 2010 July 16, Microsoft issues Security Advisory for “Vulnerability in Windows Shell Could Allow Remote 2010 Code Execution (2286198)” that covers the vulnerability in processing shortcuts/.lnk files. Verisign revokes Realtek Semiconductor Corps certificate. July 17, Eset identifies a new Stuxnet driver, this time signed with a certificate from JMicron 2010 Technology Corp. July 19, Siemens report that they are investigating reports of malware infecting Siemens WinCC 2010 SCADA systems. Symantec renames detection to W32.Stuxnet. July 20, Symantec monitors the Stuxnet Command and Control traffic. 2010 July 22, Verisign revokes the JMicron Technology Corps certificate. 2010 August 2, Microsoft issues MS10-046, which patches the Windows Shell shortcut vulnerability. 2010 August 6, Symantec reports how Stuxnet can inject and hide code on a PLC affecting industrial control 2010 systems. September Microsoft releases MS10-061 to patch the Printer Spooler Vulnerability identified by 14, 2010 Symantec in August. Microsoft report two other privilege escalation vulnerabilities identified by Symantec in August. September Symantec presents at Virus Bulletin and releases comprehensive analysis of Stuxnet. 30, 2010 Hardeep Singh Bhurji Page 3
  • 4. Infection Statistics As of September 29, 2010, the data has shown that there are approximately 100,000 infected hosts. The following graph shows the number of unique infected hosts by country: Infected Hosts The following graph shows the number of infected organizations by country based on WAN IP addresses: Infected Organizations (By WAN IP) Hardeep Singh Bhurji Page 4
  • 5. Looking at the percentage of infected hosts by country, shows that approximately 60% of infected hosts are in Iran: Geographic Distribution of Infections Stuxnet aims to identify those hosts which have the Siemens Step 7 software installed. The following chart shows the percentage of infected hosts by country with the Siemens software installed. Percentage of Stuxnet infected Hosts with Siemens Software installed Hardeep Singh Bhurji Page 5
  • 6. Stuxnet Architecture The heart of Stuxnet consists of a large .dll file that contains many different exports and resources. In addition to the large .dll file, Stuxnet also contains two encrypted configuration blocks. The dropper component of Stuxnet is a wrapper program that contains all of the above components stored inside itself in a section name “stub”. This stub section is integral to the working of Stuxnet. When the threat is executed, the wrapper extracts the .dll file from the stub section, maps it into memory as a module, and calls one of the exports. A pointer to the original stub section is passed to this export as a parameter. This export in turn will extract the .dll file from the stub section, which was passed as a parameter, map it into memory and call another different export from inside the mapped .dll file. The pointer to the original stub section is again passed as a parameter. This occurs continuously throughout the execution of the threat, so the original stub section is continuously passed around between different processes and functions as a parameter to the main payload. In this way every layer of the threat always has access to the main .dll and the configuration blocks. In addition to loading the .dll file into memory and calling an export directly, Stuxnet also uses another technique to call exports from the main .dll file. This technique is to read an executable template from its own resources, populate the template with appropriate data, such as which .dll file to load and which export to call, and then to inject this newly populated executable into another process and execute it. The newly populated executable template will load the original .dll file and call whatever export the template was populated with. Although the threat uses these two different techniques to call exports in the main .dll file, it should be clear that all the functionality of the threat can be ascertained by analyzing all of the exports from the main .dll file. Operation Unlike most malware, Stuxnet does little harm to computers and networks that do not meet specific configuration requirements; "The attackers took great care to make sure that only their designated targets were hit...It was a marksman’s job." While the worm is promiscuous, it makes itself inert if Siemens software is not found on infected computers, and contains safeguards to prevent each infected computer from spreading the worm to more than three others, and to erase itself on 24 June 2012. For its targets, Stuxnet contains, among other things, code for a man-in- the-middle attack that fakes industrial process control sensor signals so an infected system does not shut down due to abnormal behavior. The worm consists of a layered attack against three different systems: Hardeep Singh Bhurji Page 6
  • 7. 1. The Windows operating system, 2. Siemens PCS 7, WinCC and STEP7 industrial software applications that run on Windows and 3. One or more Siemens S7 PLCs. Windows infection Stuxnet attacked Windows systems using an unprecedented four zero-day attacks (plus the CPLINK vulnerability and a vulnerability used by the Conficker worm). It is initially spread using infected removable drives such as USB flash drives, and then uses other exploits and techniques such as peer-to-peer RPC to infect and update other computers inside private networks that are not directly connected to the Internet. Stuxnet is unusually large at half a megabyte in size, and written in several different programming languages (including C and C++) which is also irregular for malware. The Windows component of the malware is promiscuous in that it spreads relatively quickly and indiscriminately. The malware has both user-mode and kernel-mode rootkit capability under Windows, and its device drivers have been digitally signed with the private keys of two certificates that were stolen from separate companies, JMicron and Realtek, that are both located at Hsinchu Science Park in Taiwan. The driver signing helped it install kernel-mode rootkit drivers successfully and therefore remain undetected for a relatively long period of time. Both compromised certificates have been revoked by VeriSign. Two websites in Denmark and Malaysia were configured as command and control servers for the malware, allowing it to be updated, and for industrial espionage to be conducted by uploading information. Both of these websites have subsequently been taken down as part of a global effort to disable the malware. Step 7 software infection Once installed on a Windows system Stuxnet infects project files belonging to Siemens' WinCC/PCS 7 SCADA control software (Step 7), and subverts a key communication library of WinCC called s7otbxdx.dll. Doing so intercepts communications between the WinCC software running under Windows and the target Siemens PLC devices that the software is able to configure and program when the two are connected via a data cable. In this way, the malware is able to install itself on PLC devices unnoticed, and subsequently to mask its presence from WinCC if the control software attempts to read an infected block of memory from the PLC system. The malware furthermore used a zero-day exploit in the WinCC/SCADA database software in the form of a hard-coded database password. Hardeep Singh Bhurji Page 7
  • 8. Overview of normal communications between Step 7 and a Siemens PLC Overview of Stuxnet hijacking communication between Step 7 software and a Siemens PLC Hardeep Singh Bhurji Page 8
  • 9. PLC infection Siemens Simatic S7-300 PLC CPU with three I/O modules attached The entirety of the Stuxnet code has not yet been understood, but its payload targets only those SCADA configurations that meet criteria that it is programmed to identify. Stuxnet requires specific slave variable-frequency drives (frequency converter drives) to be attached to the targeted Siemens S7-300 system and its associated modules. It only attacks those PLC systems with variable-frequency drives from two specific vendors: Vacon based in Finland and Fararo Paya based in Iran. Furthermore, it monitors the frequency of the attached motors, and only attacks systems that spin between 807 Hz and 1210 Hz. The industrial applications of motors with these parameters are diverse, and may include pumps or gas centrifuges. Stuxnet installs malware into memory block DB890 of the PLC that monitors the Profibus messaging bus of the system. When certain criteria are met, it periodically modifies the frequency to 1410 Hz and then to 2 Hz and then to 1064 Hz, and thus affects the operation of the connected motors by changing their rotational speed. It also installs a rootkit—the first such documented case on this platform—that hides the malware on the system and masks the changes in rotational speed from monitoring systems. Speculations about the target and origin Experts believe that Stuxnet required the largest and costliest development effort in malware history. Its many capabilities would have required a team of people to program, in-depth knowledge of industrial processes, and an interest in attacking industrial infrastructure. Eric Byres, who has years of experience maintaining and troubleshooting Siemens systems, told Hardeep Singh Bhurji Page 9
  • 10. Wired that writing the code would have taken many man-months, if not years. Symantec estimates that the group developing Stuxnet would have consisted of anywhere from five to thirty people, and would have taken six months to prepare. The Guardian, the BBC and The New York Times all reported that experts studying Stuxnet considered that the complexity of the code indicates that only a nation state would have the capabilities to produce it. The self-destruct and other safeguards within the code imply that a Western government was responsible, with lawyers evaluating the worm's ramifications. It has been speculated that Israel and the United States may have been involved. In May 2011, the PBS program Need To Know cited a statement by Gary Samore, White House Coordinator for Arms Control and Weapons of Mass Destruction, in which he said, "we're glad they [the Iranians] are having trouble with their centrifuge machine and that we – the US and its allies – are doing everything we can to make sure that we complicate matters for them", offering "winking acknowledgement" of US involvement in Stuxnet. According to the British Daily Telegraph, a showreel that was played at a retirement party for the head of the Israel Defence Forces (IDF), Gabi Ashkenazi, included references to Stuxnet as one of his operational successes as the IDF chief of staff. Iran as target Ralph Langner, the researcher who identified that Stuxnet infected PLCs, first speculated publicly in September 2010 that the malware was of Israeli origin, and that it targeted Iranian nuclear facilities. However Langner more recently, in a TED Talk recorded in February 2011, stated that, "My opinion is that the Mossad is involved but that the leading force is not Israel. The leading force behind Stuxnet is the cyber superpower—there is only one; and that's the United States." Kevin Hogan, Senior Director of Security Response at Symantec, reported that the majority of infected systems were in Iran (about 60%), which has led to speculation that it may have been deliberately targeting "high-value infrastructure" in Iran including either the Bushehr Nuclear Power Plant or the Natanz nuclear facility. Langner called the malware "a one-shot weapon" and said that the intended target was probably hit, although he admitted this was speculation. Another German researcher, Frank Rieger, was the first to speculate that Natanz was the target. Natanz nuclear facilities According to the Israeli newspaper Haaretz, experts on Iran and computer security specialists are increasingly convinced that Stuxnet was meant "to sabotage the uranium enrichment facility at Natanz – where the centrifuge operational capacity has dropped over the past year by 30 percent." On 23 November 2010 it was announced that uranium enrichment at Natanz had ceased several times because of a series of major technical problems. A "serious nuclear Hardeep Singh Bhurji Page 10
  • 11. accident" occurred at the site in the first half of 2009, which is speculated to have forced the head of Iran's Atomic Energy Organization Gholam Reza Aghazadeh to resign. Statistics published by the Federation of American Scientists (FAS) show that the number of enriched centrifuges operational in Iran mysteriously declined from about 4,700 to about 3,900 beginning around the time the nuclear incident WikiLeaks mentioned would have occurred. The Institute for Science and International Security (ISIS) suggests in a report published in December 2010 that Stuxnet is "a reasonable explanation for the apparent damage" at Natanz and may have destroyed up to 1000 centrifuges (10 percent) sometime between November 2009 and late January 2010. The authors conclude: The attacks seem designed to force a change in the centrifuge’s rotor speed, first raising the speed and then lowering it, likely with the intention of inducing excessive vibrations or distortions that would destroy the centrifuge. If its goal was to quickly destroy all the centrifuges in the FEP, Stuxnet failed. But if the goal was to destroy a more limited number of centrifuges and set back Iran’s progress in operating the FEP, while making detection difficult, it may have succeeded, at least temporarily. The ISIS report further notes that Iranian authorities have attempted to conceal the breakdown by installing new centrifuges on a large scale. The virus worked by first causing an infected Iranian IR-1 centrifuge to increase from its normal operating speed of 1,064 hertz to 1,410 hertz for 15 minutes before returning to its normal frequency. Twenty-seven days later, the virus went back into action, slowing the infected centrifuges down to a few hundred hertz for a full 50 minutes. The stresses from the excessive, then slower speeds, caused the aluminum centrifugal tubes to expand, often forcing parts of the centrifuges into sufficient contact with each other to destroy the machine. According to the Washington Post, International Atomic Energy Agency (IAEA) cameras installed in the Natanz facility recorded the sudden dismantling and removal of approximately 900–1000 centrifuges during the time the Stuxnet worm was reportedly active at the plant. Iranian technicians, however, were able to quickly replace the centrifuges and the report concluded that uranium enrichment was likely only briefly disrupted. Iranian reaction The Associated Press reported that the semi-official Iranian Students News Agency released a statement on 24 September 2010 stating that experts from the Atomic Energy Organization of Iran met in the previous week to discuss how Stuxnet could be removed from their systems. Hardeep Singh Bhurji Page 11
  • 12. The head of the Bushehr Nuclear Power Plant told Reuters that only the personal computers of staff at the plant had been infected by Stuxnet and the state-run newspaper Iran Daily quoted Reza Taghipour, Iran's telecommunications minister, as saying that it had not caused "serious damage to government systems". The Director of Information Technology Council at the Iranian Ministry of Industries and Mines, Mahmud Liaii, has said that: "An electronic war has been launched against Iran... This computer worm is designed to transfer data about production lines from our industrial plants to locations outside Iran." On 29 November 2010, Iranian president Mahmoud Ahmadinejad stated for the first time that a computer virus had caused problems with the controller handling the centrifuges at its Natanz facilities. According to Reuters he told reporters at a news conference in Tehran, "They succeeded in creating problems for a limited number of our centrifuges with the software they had installed in electronic parts." Summary Stuxnet represents the first of many milestones in malicious code history – it is the first to exploit four 0-day vulnerabilities, compromise two digital certificates, and inject code into industrial control systems and hide the code from the operator. Whether Stuxnet will usher in a new generation of malicious code attacks towards real-world infrastructure—overshadowing the vast majority of current attacks affecting more virtual or individual assets—or if it is a once- in-a- decade occurrence remains to be seen. Stuxnet is of such great complexity—requiring significant resources to develop—that few attackers will be capable of producing a similar threat, to such an extent that we would not expect masses of threats of similar in sophistication to suddenly appear. However, Stuxnet has highlighted direct-attack attempts on critical infrastructure are possible and not just theory or movie plotlines. The real-world implications of Stuxnet are beyond any threat we have seen in the past. Despite the exciting challenge in reverse engineering Stuxnet and understanding its purpose, Stuxnet is the type of threat we hope to never see again. Hardeep Singh Bhurji Page 12