Is Stuxnet the 'best' malware ever? - ComputerWorld

veritas_libertasveritas_libertas Member Posts: 5,746 ■■■■■■■■■■

Comments

  • Paul BozPaul Boz Member Posts: 2,620 ■■■■■■■■□□
    Polymorphic worms with multiple payloads are pretty nasty. Worms get more sophisticated every day. If you think this worm is nasty you should wrap your brain around whats out there and unreported. Many of these bits of malware propagate for months before they're detected.
    CCNP | CCIP | CCDP | CCNA, CCDA
    CCNA Security | GSEC |GCFW | GCIH | GCIA
    pbosworth@gmail.com
    http://twitter.com/paul_bosworth
    Blog: http://www.infosiege.net/
  • NetstudentNetstudent Member Posts: 1,693 ■■■□□□□□□□
    I read about this today. Scary stuff. I have a feeling this one is a little more dangerous than your typical espionage attack considering the number of 0 day vectors it used to get in.

    I'm anxious to know what else will be learned about stuxnet as the security community continues to crack into the code.

    I'm not sure if I should be surprised in the vulnerabilities in Siemens' SCADA, considering the sophistication of the malware.
    There is no place like 127.0.0.1 BUT 209.62.5.3 is my 127.0.0.1 away from 127.0.0.1!
  • L0gicB0mb508L0gicB0mb508 Member Posts: 538
    Honestly, this isn't your run of the mill malware. This is basically a weapon programmed to hit a certain target. Multiple SCADA systems are infected, but they weren't attacked. It is actually fingerprinting its target. More than likely this is the work of a military organization.
    I bring nothing useful to the table...
  • Paul BozPaul Boz Member Posts: 2,620 ■■■■■■■■□□
    Honestly, this isn't your run of the mill malware. This is basically a weapon programmed to hit a certain target. Multiple SCADA systems are infected, but they weren't attacked. It is actually fingerprinting its target. More than likely this is the work of a military organization.

    I'd be willing to say that probably half of the malware on the internet is government sponsored in some way shape or form.
    CCNP | CCIP | CCDP | CCNA, CCDA
    CCNA Security | GSEC |GCFW | GCIH | GCIA
    pbosworth@gmail.com
    http://twitter.com/paul_bosworth
    Blog: http://www.infosiege.net/
  • subl1m1nalsubl1m1nal Member Posts: 176 ■■■□□□□□□□
    It's probably the work of the US government or ally. Think about why the US would want to know about Iran's infrastructure facilities. We want to know how nuclear capable they are.
    Currently Working On: 70-643 - Configuring Windows Server 2008 Applications Infrastructure

    Plans for 2010: MCITP:EA and CCNA
    70-648 - Done
    70-643 - In progress
    70-647 - Still on my list
    70-680 - Still on my list

    www.coantech.com
    www.thecoans.net
    www.facebook.com/tylercoan
    www.twitter.com/tylercoan
    www.linkedin.com/users/tylercoan
  • DevilWAHDevilWAH Member Posts: 2,997 ■■■■■■■■□□
    • If you can't explain it simply, you don't understand it well enough. Albert Einstein
    • An arrow can only be shot by pulling it backward. So when life is dragging you back with difficulties. It means that its going to launch you into something great. So just focus and keep aiming.
  • Bl8ckr0uterBl8ckr0uter Inactive Imported Users Posts: 5,031 ■■■■■■■■□□
    I wonder what certs they have lol
  • Unforg1venUnforg1ven Member Posts: 108
    I wonder what certs they have lol

    i lol'ed
    Next on Tap>> WGU B.S. IT - Network Administration
    MCSA:2008 Complete >> Capstone left!

    ####################################
    "One of God's own prototypes... too weird to live, too rare to die..."
  • colemiccolemic Member Posts: 1,569 ■■■■■■■□□□
    This is actually something to watch closely - if it is ever determined what gov. entity is behind it, there will be consequences, not just threats of attacks... especially if it is the USA or Israel. A BBC article I read earlier said 60% of the infections worldwide were in Iran, so I would say that's a fair indicator that it was targeted at them.

    4 zero-day exploits, valid (although stolen) digital signatures, welcome to the future of warfare.
    Working on: staying alive and staying employed
  • L0gicB0mb508L0gicB0mb508 Member Posts: 538
    I wonder what certs they have lol

    Nuclear Malware+
    Cyber Weapons+
    Certified Cyber Ninja
    I bring nothing useful to the table...
  • Bl8ckr0uterBl8ckr0uter Inactive Imported Users Posts: 5,031 ■■■■■■■■□□
    Nuclear Malware+
    Cyber Weapons+
    Certified Cyber Ninja

    On a serious note though, where you acquire that level of skill? I mean that has to be way, way beyond what they are teaching at most schools.
  • colemiccolemic Member Posts: 1,569 ■■■■■■■□□□
    I would imagine there are a LOT of people involved in writing a code that complex (I believe it was around 500K in size.) You simply take industry coding experts and then try to package it all together, I guess.

    I have no idea where they find people that have that kind of cyber ninja skills, but I would imagine the NSA has quite a few. Probably raid MIT's grade book, LOL
    Working on: staying alive and staying employed
  • dynamikdynamik Banned Posts: 12,312 ■■■■■■■■■□
    On a serious note though, where you acquire that level of skill? I mean that has to be way, way beyond what they are teaching at most schools.

    PENETRATION TESTING TRAINING - ONLINE @ INFOSEC INSTITUTE

    That's how I'm spending approximately 75% of my 2011 training budget. It's really not that out-of-reach.

    Start with Hacking: The Art of Exploitation (2nd) and The Shellcoder's Handbook if you're looking for a couple of books.
  • L0gicB0mb508L0gicB0mb508 Member Posts: 538
    On a serious note though, where you acquire that level of skill? I mean that has to be way, way beyond what they are teaching at most schools.

    I would say that the task is broken down into specializations. Each little team would have their hand in creation. Obviously they would need someone to know the SCADA systems extremely well, someone to actually write the exploit, and probably some crypto people involved as well. The initial reports of this seemed to think it was brought in via usb flash drives by contractors. You would obviously need some type of operator to gather intelligence on the people you are planning to use as the mule and carry out the mission of installing the code on their drives.

    This is about the worst case scenario for SCADA systems. A lot of experts touted that SCADA was not really susceptible to attacks because they should have no contact with the outside world. This attack eliminates the need, and runs without any connection to the outside world.
    I bring nothing useful to the table...
  • L0gicB0mb508L0gicB0mb508 Member Posts: 538
    Paul Boz wrote: »
    I'd be willing to say that probably half of the malware on the internet is government sponsored in some way shape or form.

    I would go along with that to a degree. This is far beyond what most are capable of though. SCADA is however quite frequently targeted. If you do a lot of intrusion detection work you will see some of the more well known SCADA ports being hit pretty frequently. I doubt this method works, but they give it a go anyway.
    I bring nothing useful to the table...
  • DevilWAHDevilWAH Member Posts: 2,997 ■■■■■■■■□□
    On a serious note though, where you acquire that level of skill? I mean that has to be way, way beyond what they are teaching at most schools.

    In your bed room with a PC and lots of Pizza and Coke.

    All of the true experts in any field of IT are the guys who Learn a little bit on courses and then have enough intrest and self motivation to take that knowlage and delve in to it untill they completly understand it to the finest degree.

    When you talk about some one like Stephen Hawkins having such deep understanding of Physics, you don't ask where he acquired it all from. Becasue so much of what he knows is self taught and thought up. It's the same with these guys, people who know this much about stuff learn it because they are the true Nerds/Geeks of the IT security world, they live and breath this stuff.

    Having delt with a few PEN testing guys you can tell the good ones from the poor ones. If you mention something to a good guy they haven't heard before, they come in the next day knowing it inside out and back to frount becasue they have spent all night playing around with it.

    I don't really think this needs goverment funding to achive, just a group with some money behind them and well orginised. most of these cases it is comming up with the idea and orgnising it, that is the stumbling block, not the money invloved. There are plenty of well funded well orgnised non goverment groups tha would love to attack Iran. And who would be more than capabable of carrying out some thing like this.

    On a side note looking at the logs on a internet facing firewall, it is shocking to see the large number of probs and connection attempts comming in. And when you see the tools that script kiddies can get there hands on (like nmap for example) if do find it suprising there are not more serious attacks happening.
    • If you can't explain it simply, you don't understand it well enough. Albert Einstein
    • An arrow can only be shot by pulling it backward. So when life is dragging you back with difficulties. It means that its going to launch you into something great. So just focus and keep aiming.
Sign In or Register to comment.