Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity
    • IT Management
    • Networking

    Stuxnet Worm: Nine Facts Every IT Security Pro Should Know

    By
    Brian Prince
    -
    September 30, 2010
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      1Stuxnet Worm: Nine Facts Every IT Security Pro Should Know

      1

      by Brian Prince

      2The Target

      2

      Security researchers have traced Stuxnet worm to as far back as June 2009. It targeted the control systems at industrial plants, specifically Siemens’ WinCC and Step 7 software. Historic data shows that Iran (nearly 59 percent), Indonesia (18.22 percent) and India (8.31 percent) accounted for most of the early infections. According to Siemens, 15 of its customers were identified as having detected the worm on their systems as of Sept. 14. None of them reported it doing any damage.

      3Digital Certificates to Go

      3

      As part of its tactics, Stuxnet used stolen digital certificates belonging to legitimate companies to hide. The certificates were from Realtek Semiconductor and JMicron Technology. The stolen certificates helped keep the malware under the radar.

      4Zero Hour

      4

      Variants of Stuxnet used three separate Microsoft zero-day vulnerabilities, as well as a fourth that was unknown to Microsoft but had been mentioned publicly in 2009. Two of these four were escalation of privilege vulnerabilities that remain unpatched. In addition, the worm also used the patched Microsoft Windows Server Service RPC issue exploited by the Conficker worm.

      5Before the .LNK Vulnerability

      5

      The first zero-day publicly associated with Stuxnet was a vulnerability involving the loading of .LNK files on Windows. But before that, early versions of Stuxnet abused Windows’ AutoRun feature to spread. Rather than use an actual vulnerability, the malware took advantage of the way AutoRun processes commands from autorun.inf files to get the system to execute the worm’s malicious code.

      6Inside Stuxnet

      6

      Each of the exported functions pictured here has code to perform different actions. For example, there are exports to communicate with a command-and-control server. In addition, the worm can access files created by the Step 7 software and install a kernel-level rootkit. The worm also scans to see if certain anti-virus programs are running.

      7Be Fruitful and Multiply

      7

      Researchers have uncovered multiple propagation vectors for the worm. In addition to using infected USB devices, the worm also copies itself to network shares protected by weak passwords. Stuxnet also has the ability to upgrade through peer-to-peer, giving the attackers the ability to be updated after the initial command-and-control server was disabled. Pictured here is a map of infections.

      8The Discovery

      8

      In July, VirusBlokAda reported its researchers discovered malware in June that was exploiting the .LNK vulnerability. An analysis of the malware by the security community quickly revealed the malware was targeting SCADA [supervisory control and data acquisition] systems.

      9The Solution

      9

      As the weeks wore on, Microsoft patched some of the vulnerabilities associated with the worm, while security vendors issued detection for it. For its part, Siemens distributed a tool developed by Trend Micro to help companies clean their systems. This graph depicts recent infection levels worldwide.

      10Cyber-war?

      10

      An open-ended question due to Stuxnet’s sophistication is whether the malware was created on behalf of an intelligence agency to disrupt industrial systems, particular in light of the fact that Iran’s first nuclear power plant was found to have been infected. Others have suggested it could have been done by a well-funded team of experts. While no firm evidence of state-sponsored activity has been uncovered, several security analysts have described it as a wakeup call for SCADA security.

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×