Sunday, September 26, 2010

Safety News Alert: #StuxNet worm attacking critical infrastructure systems

Stuxnet Worm Malware Hits Computerized Industrial Control Equipment.
  •  Security experts say Stuxnet attacked the software in specialized industrial control equipment made by Siemens by exploiting a previously unknown hole in the Windows operating system.
  • Eric Chien, the technical director of Symantec Security Response, a security software maker that has studied Stuxnet, said it appears that the malware was created to attack an Iranian industrial facility.
  • The malware marks the first attack on critical industrial control systems known as SCADA(Supervisory control and data acquisition.) It generally refers to industrial computer control system.
CFN News CFN News
Picture: Future Stuxnet Casualties in secret Iranian Nuclear control room - Adapted from Getty Images photo
The malware, known as Stuxnet, was discovered by VirusBlokAda, a Belarussian computer security company in mid July, at least several months after its creation.It was first reported by the security company VirusBlokAda in mid-June 2010, and roots of it have been traced back to June 2009.[2] The worm contains a component with a build time stamp from 3 February 201
  • Stuxnet has the ability to steal design documents or even sabotage controlled equipment in a factory or industrial setting such as a nuclear plant.
StuxNet Worm Removal: Siemens has released a detection and removal tool for Stuxnet. Siemens recommends contacting customer support if an infection is detected and advises installing the Microsoft patch for vulnerabilities and disallowing the use of third-party USB sticks.

The malware casts a spotlight on several security weaknesses.
Who: Security experts say that it was likely staged by a government or government-backed group, in light of the significant expertise and resources required to create it. The specific facility that was in Stuxnet’s crosshairs is not known, though speculation has centered on gas and nuclear installations.
Stuxnet’s remarkable sophistication has surprised many security professionals. Its authors had detailed knowledge of Siemens’ software and where its security weaknesses are. They discovered and used four unknown security flaws in Microsoft’s Windows operating system. And they masked their attack with the aid of sensitive intellectual property stolen from two hardware companies, Realtek and JMicron, which are located in the same office park in Taiwan.
“It’s impossible this was created by some teenager in his basement,” Mr. Chien said. “The amount of resources and man hours to put this together,” he said, show “it has to be something that was state originated.”
What: Since it was unleashed, Stuxnet has spread to plants around the world. Siemens said it has received 15 reports from affected customers, five of which were located in Germany.
How: Stuxnet attacks Windows systems using four zero-day attacks (including the CPLINK vulnerability and a vulnerability used by the Conficker worm) and targets systems using Siemens' WinCC/PCS 7 SCADA software. It is initially spread using infected USB flash drives and then uses other exploits to infect other WinCC computers in the network. Once inside the system it uses the default passwords to command the software.[2] Siemens however advises against changing the default passwords because it "could impact plant operations".[4]
Bad News: But more in-depth study of the program, which is extremely large and highly complex by malware standards, has revealed that it can also make changes to control systems.
Exactly what Stuxnet might command industrial equipment to do still isn’t known. But malware experts say it could have been designed to trigger such Hollywood-style bedlam as overloaded turbines, exploding pipelines and nuclear centrifuges spinning so fast that they break. “The true end goal of Stuxnet is cyber sabotage. It’s a cyber weapon basically,” said Roel Schouwenberg, a senior antivirus researcher at Kaspersky, a security software maker. “But how it exactly manifests in real life, I can’t say.”


Twitter hashtags: #Stuxnet #Iran #nuclear #industrial #system #control #worm/ #Malware #SCADA

Stuxnet News updated links stories/articles:
NY Times blog link:
Wikipedia article link:
#Stuxnet update: One of the theories is starting to point to a targeted sabotage of Iran’s nuclear facilities.
The latest, put forward by Frank Rieger, a researcher at security and encryption firm GSMK, posits in a Frankfurt newspaper (translation here) and on his blog that Stuxnet targetted a nuclear enrichment facility in the Iranian town of Natanz. Stuxnet has spread internationally, but the vast majority of infections have happened in Iran, according to numbers from antivirus firm Symantec in July.

Rieger points to signs that Stuxnet was engineered to infect systems as early as January 2009. And in July 2009, whistle-blower site Wikileaks posted a note from an anonymous source describing a nuclear accident in Natanz. The head of Iran’s nuclear program resigned shortly thereafter, and Rieger points to official Iranian numbers that showed a reduction in working enrichment centrifuges.

Rieger’s other piece of evidence pointing to Natanz comes from Stuxnet’s architecture. He writes, based on the current analysis of the worm’s software, that its infection is “intended to be synchronized and spread over many nodes.” That makes more sense in an enrichment plant filled with thousands of identical centrifuge units than in a more centralized nuclear power plant, he writes.

Robert Langner, another security researcher focused on the Siemens software systems that Stuxnet targets, has performed an analysis that he says shows that Stuxnet has the capability to cause centrifuges to malfunction, but he’s pointed to Iran’s Bushehr nuclear reactor, not Natanz, as a target, according to the Christian Science Monitor and IDG News.


  1. Emergency medical technician (EMT) software is designed to train EMT professionals. These professionals are trained to take care of emergency medical situations arising due to accidents, fires or any other incident at home or workplace causing injuries. These professionals are not exact paramedic even though their work is somehow similar to that of a paramedic Normally ambulances are staffed by at least one staff
    with EMT 4 training accompanied by EMT 2 or EMT 3 training. The ambulance driver is also trained in basic EMT skills.
    Fire Fighter

  2. Thnq for sharing good article AStack gas analyzers is a type of analytical device that analyzes the awareness of emitted gas from stack or flue in the industrial application.


- Due to rampant abuse, we are no longer posting anonymous comments. Please use your real OpenID, Google, Yahoo, AIM, Twitter, Flickr name.

Twitter Buttons

****REMINDER**** Every fire has the ability to be catastrophic. The wildland fire management environment has profoundly changed. Growing numbers of communities, across the nation, are experiencing longer fire seasons; more frequent, bigger, and more severe, fires are a real threat. Be careful with all campfires and equipment.

"I am a firm believer in the people. If given the truth, they can be depended upon to meet any national crisis. The great point is to bring them the real facts, and beer." --Abraham Lincoln

View blog top tags

Subscribe via email to California Fire News - Keep track of Cal Fire News

Enter your email address:

Delivered by FeedBurner