Welcome Guest. | Log In| Register | Membership Benefits
Dark Reading's Hacked Off Weblog
Topics:   Hacked Off

  • Email this page E-mail this page
  • Print this page Print this page
  • Bookmark and Share

Stuxnet: An Amateur's Weapon


Posted by Gadi Evron, Oct 15, 2010 04:30 PM

Stuxnet, a Trojan supposedly designed to attack Iran's nuclear program, is so technically advanced that it is said to be able to remotely explode a power plant without the controller noticing. Such an advanced weapon was developed by people with means. But whoever they are, they're amateurs.

In military operations there are two main parameters: to be balanced, maintaining operational covertness, and meeting operational goals.

For thieves to break into a secure facility, they'd first collect intelligence and build a set of tools to aid them. These tools are expensive, with years of research have gone into them. They'd also need to remain covert, or the operation could be compromised.

However, covertness can get in the way. Do you wait for a perfect date three years from now when a building is being renovated, or carry on to meet your operational goals when a cleaning crew might be in the building?

The same parameters apply with cyberattacks. From a technological standpoint, Stuxnet is very advanced and costly. It uses four vulnerabilities that hadn't been seen before to exploit computer systems for access. One of these enables an attacker to infect a computer by merely inserting a USB key.

This is perfect for attacking a nuclear facility, which isn't connected to the Internet. But operationally it means a person would have to be there physically to accomplish the mission: a spy, a rogue employee, or a commando team.

For such an operation, Stuxnet must not fail. There has to be clear intelligence about how the systems it attacks are built. Also, given the nature of these systems (industrial software that controls power plants, like SCADA systems), it would have to be developed in a replication of the target environment -- an immense cost to reconstruct and an effort in intelligence collection.

Such a tool would be used carefully to avoid the risk of discovery -- not just the specific operation, but of methods used, the technology developed, and past targets.

How then could a target-specific weapon such as Stuxnet be found in tens of thousands of computers worldwide, as vendors such as Microsoft report? It makes no operational sense to attack random computers, which would increase the likeliness of discovery and compromise the operation. Could this be a mistake? Unlikely, as a tool developed for such a specific job would not do anything other than it is told.

Why does Stuxnet infect computers randomly after it gains access to its target? Whatever it is looking for (perhaps a way to phone home?) should already be preplanned.

Further, Stuxnet remained active when, in 2009, one of the zero-day vulnerabilities was reported publicly and patched by Microsoft. Why would its operators risk the discovery of such a costly weapon by keeping it in the field when discovery is now a real risk?

And last but not least, who would have wanted to attack systems in, to name three target countries, Iran, the United States, and Germany, where, according to security vendors, many of the thousands of infections were discovered?

We simply can't tell from technical data alone who is behind it. We can, however, ask what damage has been done and who stood to gain from it.

If we are to believe media reports, then Iran's nuclear efforts have been delayed by three months. These reports are unsubstantiated, but taking them on their word, it doesn't seem likely that Israel or the United States would invest so much for such a small return. It is still within the realm of possibility that some nation-state was behind it, even Iran itself. While in democracies it's the exact opposite, in dictatorial countries most of the intelligence efforts are turned inward.

Another option is that this was a corporate rival of Siemens, the vendor whose SCADA systems Stuxnet targets. Siemens reported it has so far discovered 14 clients (read: power plants) that have been infected, a large portion of which are in Germany. Siemens suffered major PR damage as a result of Stuxnet.

It could also be criminals, with a goal as simple as ransoming these power plants. As unlikely as this scenario sounds, it is as sound a guess as any of the others.

Among the many guesses as to who built Stuxnet, fingers were also pointed at Israel. As an Israeli, I hope such sloppy work wasn't ours. Yes, Stuxnet is advanced, but no military or intelligence organization should be this careless. It is just too amateurish from an operational standpoint.

The plain truth is we don't know who is behind Stuxnet, and we, as experts, shouldn't be ashamed to admit that rather than making outlandish claims that create news. But whoever it was, they were clearly not experienced, even if they were well-funded.

Follow Gadi Evron on Twitter: http://twitter.com/gadievron.

Gadi Evron is an independent security strategist based in Israel. Special to Dark Reading.

« Facebook, Why Don't You Learn A Security Lesson From Apple? | Main | It's About The User »



Sign up now for the weekly InformationWeek Blog Newsletter.
Comments 2 Comments

-- Most recent comment --

How to infect a closed system

Comment by Bestis Oct 19, 2010, 16:45 PM EDT

"This is perfect for attacking a nuclear facility, which isn't connected to the Internet. But operationally it means a person would have to be there physically to accomplish the mission: a spy, a rogue employee, or a commando team."

Not really. Just drop 10 or 20 flash drives with your virus loaded anywhere around your target. Local stores, or just in the road. Then wait for them to phone home. Real-world tested. It works.

For you to say "Amateur" is completely wrong Gadi Evron. Comment by n3td3vSecurity Oct 15, 2010, 22:41 PM EDT
How to infect a closed system Comment by Bestis Oct 19, 2010, 16:45 PM EDT




This is a public forum. United Business Media and its affiliates are not responsible for and do not control what is posted herein. United Business Media makes no warranties or guarantees concerning any advice dispensed by its staff members or readers.

Community standards in this comment area do not permit hate language, excessive profanity, or other patently offensive language. Please be aware that all information posted to this comment area becomes the property of United Business Media LLC and may be edited and republished in print or electronic format as outlined in United Business Media's Terms of Service.

Important Note: This comment area is NOT intended for commercial messages or solicitations of business.








  1. Stuxnet: An Amateur's Weapon
  2. Zero-Day Pen Testing Under Fire
  3. A Peek At The Intel-McAfee Strategy
  4. Facebook, Why Don't You Learn A Security Lesson From Apple?

  1. The Office: Who Needs It?
  2. What Adobe's New PDF Sandbox Really Means For Attackers
  3. Metasploit: One Year After The Rapid7 Acquisition
  4. Incidence Of Cybertheft Surpasses Incidence Of Physical Theft For The First Time, Study Says
  5. One-Time Passwords On The Rise But Come With Some Risks
  6. Pentagon's Insider Threat Push Offers Lessons For Enterprises

  1. Laptop Locks: A Simple and Cost-Effective Approach to DLP
  2. Laptop Theft The Internal and External Threats
  3. Understanding Man in the Browser Attacks and Addressing the Problem
 
 


 
  Ars Technica
Boing Boing
Channel 9 Forums
CRN Blogs
Dr.Dobb's Portal: Blogs
Engadget
Gizmodo
GrokLaw
  Lifehacker
Schneier on Security
Slashdot
TechCrunch
Techdirt
Techmeme
Valleywag
 
  OCTOBER 2008
SEPTEMBER 2008
APRIL 2008
NOVEMBER 2007
  OCTOBER 2007
AUGUST 2007
MARCH 2007
OCTOBER 2006