Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

How Stuxnet is Scaring the Tech World Half to Death
The Weekly Standard ^ | 9/30/2010 | Jonathan V. Last

Posted on 10/03/2010 8:09:37 AM PDT by GVnana

The computer worm Stuxnet broke out of the tech underworld and into the mass media this week. It’s an amazing story: Stuxnet has infected roughly 45,000 computers. Sixty percent of these machines happen to be in Iran. Which is odd. What is odder still is that Stuxnet is designed specifically to attack a computer system using software from Siemens which controls industrial facilities such as factories, oil refineries, and oh, by the way, nuclear power plants. As you might imagine, Stuxnet raises big, interesting geo-strategic questions. Did a state design it as an attack on the Iranian nuclear program? Was it a private group of vigilantes? Some combination of the two? Or something else altogether?

But it’s worth pausing to contemplate Stuxnet on its own terms, and understand why the tech nerds were so doomsday-ish about it in the first place. We should start at the beginning.

A computer worm is distinct from a virus. A virus is a piece of code which attaches itself to other programs. A worm is a program by itself, which exists on its own within a computer. A good (meaning really bad) worm must do several things quite subtly: It must find its way onto the first machine by stealth. While a resident, it must remain concealed. Then it must have another stealthy method of propagating to other computers. And finally, it must have a purpose. Stuxnet achieved all of these goals with astounding elegance.

(Excerpt) Read more at weeklystandard.com ...


TOPICS: Culture/Society; Foreign Affairs; News/Current Events
KEYWORDS: 05091979; cyberwar; habibelghanian; myrtus; stuxnet; tech; virus; worm
Navigation: use the links below to view more comments.
first 1-2021-4041-6061-8081-83 next last
So...what's your theory?
1 posted on 10/03/2010 8:09:40 AM PDT by GVnana
[ Post Reply | Private Reply | View Replies]

To: GVnana

It was that Lee harvey Oswald, he’s one smart bastard.


2 posted on 10/03/2010 8:11:16 AM PDT by yesca (..belief is the enemy)
[ Post Reply | Private Reply | To 1 | View Replies]

To: GVnana

Oh come on... it’s pretty obvious and I might say rather ingenious.


3 posted on 10/03/2010 8:11:55 AM PDT by BigFinn (ECCLESIASTES 10:2 A wise man's heart is at his right hand; but a fool's heart is at his left.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: GVnana

Betcha it propagated via a ghosted update link for Siemens PLC equipment. IOW, hacked their update site (redirected update inquiries) and downloaded the worm along with legitimate updates taken from the real update URL. Would take a while to happen, but would get many many places if fake update emails were sent to Siemens PLC users.....check the prior emails.....


4 posted on 10/03/2010 8:14:59 AM PDT by Gaffer ("Profiling: The only profile I need is a chalk outline around their dead ass!")
[ Post Reply | Private Reply | To 1 | View Replies]

To: BigFinn

I agree. I sit around and listen and read people asking, “What is Isreal waiting for?”

They are not waiting.

And they got under all that rock above the labs.

This is both amusing and extremely interesting.


5 posted on 10/03/2010 8:17:19 AM PDT by Vermont Lt (We are so screwed.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: GVnana
It was just a matter of time before industrial wars were fought on the grid. My experience in the industry gives me a gut feeling that Israeli agents are the genesis of this worm. Their engineers would be considered savants in any other society.

All hail to them (unless they point it at us!).

6 posted on 10/03/2010 8:20:41 AM PDT by Glenn (iamtheresistance.org)
[ Post Reply | Private Reply | To 1 | View Replies]

To: GVnana

Does its discovery and the resulting patches mean it is no longer a threat?

Was it discovered before it could do any harm other than the cost to remove it or install the patches to make it inactive?


7 posted on 10/03/2010 8:23:31 AM PDT by Gadsden1st
[ Post Reply | Private Reply | To 1 | View Replies]

To: GVnana
To date, no one knows exactly what Stuxnet was doing in the Siemens PLC. “It’s looking for specific things in specific places in these PLC devices,” Digital Bond CEO Dale Peterson told PC World.


That Dale Peterson guy is everywhere now.

8 posted on 10/03/2010 8:23:57 AM PDT by ScottinSacto (W.W.M.R.D.? - What Would Mitch Rapp Do?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: GVnana
Stuxnet achieved all of these goals with astounding elegance.

Well, that pretty much rules out all governments as creator of Stuxnet. Start looking at gauche, bespectacled misfits in parental basements.

9 posted on 10/03/2010 8:29:45 AM PDT by 668 - Neighbor of the Beast ( A window seat, a jug of elderberry wine, and thou.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: GVnana
So...what's your theory?

It was written and executed by a nation. No other virus has ever had 4 zero day exploits and a rootkit of this sophistication. No other virus I have seen has a kill date built in either......2012 IIRC...

10 posted on 10/03/2010 8:34:10 AM PDT by ScreamingFist
[ Post Reply | Private Reply | To 1 | View Replies]

To: Vermont Lt; GVnana

>>> This is both amusing and extremely interesting

Interesting definitely, amusing no.

First, consider a parallel with AIDS. It didn’t stay in Africa. Natural or digital, virus’ spread, and this is already spreading beyond Iran.

Secondly, there are countries with proficient hackers who can use this as a model and send new variants to our own systems. Iran can easily pay for this to be done, and it would cost a fraction of their nuke program.

The US is the world’s most computerized economy. We have the most to lose. This will get nasty.


11 posted on 10/03/2010 8:36:55 AM PDT by tlb
[ Post Reply | Private Reply | To 5 | View Replies]

To: ScreamingFist

If you wanted to destroy a system such as Iran’s nuke facility, wouldn’t it be designed to spread and activate quickly before it could be discovered and countered? Any information when it was supposed to activate? Was it based on just finding the “right” system or was a date also required?


12 posted on 10/03/2010 8:38:57 AM PDT by Gadsden1st
[ Post Reply | Private Reply | To 10 | View Replies]

To: Vermont Lt
And they got under all that rock above the labs. This is both amusing and extremely interesting.

It's sweet to believe they used their marvelous minds. As old Solly from the deli next door would have said, "Bunker busters? Watch, we'll get in there with a noodle!"

13 posted on 10/03/2010 8:39:34 AM PDT by 668 - Neighbor of the Beast ( A window seat, a jug of elderberry wine, and thou.)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Glenn
Years and years ago our office got regular visits by FBI agents interested in the comings and goings of one of our employees due to his advanced use of modems and such.

This was way back in the mid-1970s.

Seems he could call up modems at CIA's Langley headquarters and make them deliver the goods (so to speak).

I can only imagine that 35 years of R&D has improved everyone's skill levels!

14 posted on 10/03/2010 8:41:19 AM PDT by muawiyah ("GIT OUT THE WAY" The Republicans are coming)
[ Post Reply | Private Reply | To 6 | View Replies]

To: GVnana

My company made using USB thumb drives a firing offense months ago. I wonder how much security discipline the Iranians have? Middle eastern (and other IIIrd World) countries are not famous for their discipline. Remember CIA director John Deutch mishandling classified information. That’s SOP in the third world. The bosses don’t believe the rules apply to them.


15 posted on 10/03/2010 8:43:20 AM PDT by Lonesome in Massachussets (The naked casuistry of the high priests of Warmism would make a Jesuit blush.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: GVnana

Wish I could say that we had a hand in it...but actually, I would expect that Israel was the culprit...thank goodness.

I just hope that this prevents the all out war that seems to be brewing between Israel and several of the other states surrounding it.

Of course, this only delays the inevitable so Israel still may have to kick their butts again...


16 posted on 10/03/2010 8:44:42 AM PDT by Deagle
[ Post Reply | Private Reply | To 1 | View Replies]

To: muawiyah

The Cuckoo’s Egg by Clifford Stoll was an excellent account of early hacking.


17 posted on 10/03/2010 8:45:30 AM PDT by Gadsden1st
[ Post Reply | Private Reply | To 14 | View Replies]

To: GVnana
“After the original code is no longer executed, we can expect that something will blow up soon,” Langner says somewhat dramatically. “Something big.”

That would be hilarious, if suddenly a crater were to appear in some Iranian desert and an Israeli pilot just happened to have video of it, sort of like the flotilla flick. One more Jewish media coup for Rick Sanchez to lament, LOL.

18 posted on 10/03/2010 8:45:52 AM PDT by 668 - Neighbor of the Beast ( A window seat, a jug of elderberry wine, and thou.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Gadsden1st
If you wanted to get control over Iran's nuclear program you'd insert a "sub system" into the OS insofar as it was resident in a computer that did very little ~ just flip a switch here or there more or less at random.

Simply changing "timing" on minor programs ought to be enough to corrupt everything.

They'd have a doggone difficult time finding such a thing. Best of all ~ if you already had your virus sub system on their backups they'd never get rid of it.

A thimble full of powdered molybdenum would be sufficient for a recurring disruption of everything. It would work by impacting ordinary electrical connections in devices, or even wall outlets. Totally undetectable.

You could import it into a facility on the bottoms of your shoes ~ a little bit every day and next thing you know the whole place is messed up.

19 posted on 10/03/2010 8:47:37 AM PDT by muawiyah ("GIT OUT THE WAY" The Republicans are coming)
[ Post Reply | Private Reply | To 12 | View Replies]

To: GVnana
How did Stuxnet spread as far as it did?

Assuming that conventional wisdom is correct, the wide spread of Stuxnet probably also reveals which bastards are assisting or interacting with the the Iranians. I would expected that those traces have already been cached in detail and it's all been echoed back to a recoverable data drop location.

With today's electronic listening capabilities I wouldn't be surprised also if some of this mysterious code isn't set to create a unique noise pattern or other identifiable signal using the internal components of the mainframes and work stations. I've read that it's even possible to cause a monitor "sing" at a specific frequency.

I wouldn't want to be a night janitor at one of these nefarious facilities.

20 posted on 10/03/2010 8:48:05 AM PDT by ElkGroveDan (Now can we forget about that old rum-runner Joe Kennedy and his progeny of philandering drunks?)
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-6061-8081-83 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson