Analysis Stuxnet Dissected
Analysis Stuxnet Dissected
Analysis Stuxnet Dissected
TODAY ON SC MAGAZINE: The case for splitting identity and access SEARCH
Sophos: mobile malware scandal 'damages' industry WhiteGold signs networ
HOME NEWS PRODUCTS ALERTS STATS BLOGS WHITEPAPERS EVENTS JOBS DOWNLOADS
Vulnerabilities
AWARDS & Exploits Breaches & Exposures Messaging Mobile Access Control Biometrics & Forensics Legal Risk Management Patch Management
SC Magazine Australia/NZ > News > Legal > Cybercrime > Analysis: Stuxnet dissected Monday March 28, 2011 3:42 PM AEST
CYBERCRIME
Vulnerability Alerts
MOST READ MOST DISCUSSED LATEST NEWS
Engineers often used ruggedised laptops, he said, that are taken off-site for new
instruction sets to be programmed and taken into the facility to upload these new
commands to the system. Popular Tags
Hogan suspected that the worker that infected the machines made a genuine mistake
rather than a deliberate attempt at spying.
autorun
acqusition asio
The attacker may have deliberately left memory sticks lying around at the offices of
vulnerability
the outsourced provider. As long as one machine was infected, any network it centrifuge cyberwar
cert china control
connected to was at risk - and the worm was programmed to use these connections
to seek out those devices that could do the damage. iran nuclear
dr dsd
1 of 4 3/27/2011 6:47 PM
Analysis: Stuxnet dissected > Cybercrime > Legal > News > SC Magazin... http://www.securecomputing.net.au/News/249061,analysis-stuxnet-dissec...
The Stuxnet worm then used compromised security certificates from two Taiwanese
siemens stuxnet
device manufacturers - JMicron and Realtek - to allow Stuxnet to run more deeply
inside the target computer.
supervisory control
"Someone got access to private keys of those two organisations - which curiously are
and data acquisition
based within a few kilometres of each other," Hogan said. symantec security
Stuxnet would then log-in, create an internet connection and connect to two command response zeroday
and control servers to download instructions.
exploit
3. Looking around the network
The worm also used vulnerability in Microsoft's Windows print spooler to spread to
other devices connected to the local area network for infection, copying itself and
executing on network shares.
The virus also performs a check to see whether a Siemens Step 7 SCADA software is
running on any devices connected to the infected machine.
If any computers with this software are found on the network, Stuxnet copies itself and
executes on these machines, too.
Once the virus finds machines running the Siemens software, it infects the Step7
project files as another way to spread around the target installation.
Ultimately, Stuxnet attempts to upload its own code to the Siemen's controllers or
programmable logic controllers that act as a hardware-software interface. In the case
of the Iranian nuclear enrichment facility, the controllers were connected to frequency
modulators that ran high-speed motors to spin the centrifuges used for nuclear
enrichment.
So Stuxnet was able to download a fresh set of commands to the controllers that
would override instruction sets.
This code instructed frequency converters on how fast the 164 motors in the
centrifuges should spin and for how long.
Stuxnet was programmed to first watch the frequency modulation for 13 days to
calculate what instructions could cause the most physical damage. Symantec
believes Stuxnet would have inserted a set of instructions to spin up the frequency
converters at 1410Hz for 15 minutes, well above the usual limit of 1064Hz.
"We assume it was spinning it up quickly to malfunction," Hogan said. "It was an
attempt to create sympathetic vibrations that would cause problems," he said,
potentially even breaking the rotors or centrifuges themselves.
Next, Stuxnet's instruction set aimed to set the frequency converters back to nominal
speed for at least 27 days, then set the speed way back down to 2Hz for some 50
minutes, before spinning back to normal speed, screaming back up to 1410Hz, and so
on and so forth.
In order to inflict maximum damage, Stuxnet would intercept any attempt by operators
to upload new code onto the controller chips. As new instructions are uploaded,
Stuxnet would shunt the code aside and keep its own instructions running, but
present a picture back to the operators that suggested all was running as it should be.
"If you went in and looked at the .DLL file, you would see your original code," Hogan
remarked. "Stuxnet is hiding what it is doing."
After months of pulling Stuxnet apart and documenting its ability, Hogan is convinced
it is the "first publicly known malware to intend real-world damage".
Symantec has noted that the attacker would have required access to the design
schematics of the plant, to the private keys of the two Taiwanese manufacturers, and
2 of 4 3/27/2011 6:47 PM
Analysis: Stuxnet dissected > Cybercrime > Legal > News > SC Magazin... http://www.securecomputing.net.au/News/249061,analysis-stuxnet-dissec...
a team of "five to 10 core developers" taking about six months to develop the exploit.
With the LNK vulnerability now known, and Stuxnet analysed in every corner, Hogan
is confident it will be a relatively isolated attack.
"But the whole area of industrial controls systems security is now an open to a lot
more eyes and brains than it was before - for both good and bad."
The writer attended Symantec's research labs in Japan as a guest of the anti-virus
vendor.
Ads by Google
Image
Showing 0 comments
Reactions
From Twitter
From Twitter
Dissecting #Stuxnet: Behind the news w virus chasers who found the world's first state-
sponsored malware http://bit.ly/dJBHuO
From Twitter
3 of 4 3/27/2011 6:47 PM
Analysis: Stuxnet dissected > Cybercrime > Legal > News > SC Magazin... http://www.securecomputing.net.au/News/249061,analysis-stuxnet-dissec...
From Twitter
Analysis: Stuxnet dissected: How one of the world's most complex cyber attacks
crippled Iran's nuclear programme. http://bit.ly/eCatoU
Trackback URL
Ads by Google
News Photo Galleries Vulnerabilities & Exploits Breaches & Exposures Messaging
Latest News Latest Galleries Application Flaws Identity Email Security
Latest Features Web Corporate Data IM Security
Latest Opinions Whitepapers Spyware Health VoIP Security
Latest Whitepapers Malware E-Commerce Security Storage
Alerts Botnet
Latest Security Alerts Events Trojan
Mobile Access Control
DDoS
Latest Events Wi-fi Security PKI
Products Social Networking
Submit an Event Smartphone Password Manager
Endpoint Security
Latest Reviews Remote Access Single Sign On
Latest Group Tests Jobs iPhone Smart Cards Tokens
Latest Jobs Virtualisation Network Access
Stats Advertise a Job Vacancy
Latest Stats
Biometrics & Forensics Legal Risk Management
Downloads
Blogs Biometrics Cybercrime Training
Latest Downloads
Forensics Audit Policy Management
Latest Blogs
Privacy Incident Response
Managed Services
Conferences
Contact Us | Advertise | About Us | SC Awards | Editorial | Newsletter | Syndication | Site Map | RSS
Atomic MPC | CRN Australia | iTnews | PC & Tech Authority | PC & Tech Authority Business Centre | SC Magazine
Copyright © 2011 Haymarket Media. All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of Haymarket Media's Privacy Policy and Terms & Conditions.
4 of 4 3/27/2011 6:47 PM