http://homelandsecuritynewswire.com/stuxnet-worlds-first-cyber-superweapon-a
ttacks-china

 


Stuxnet, world's first "cyber superweapon," attacks China


Published 1 October 2010

Stuxnet, the most sophisticated malware ever designed, could make factory
boilers explode, destroy gas pipelines, or even cause a nuclear plant to
malfunction; experts suspect it was designed by Israeli intelligence
programmers to disrupt the operations of Iran's nuclear facilities --
especially that country's centrifuge farms and the nuclear reactor in
Bushehr; it has now infected Chinese industrial control systems as well; one
security expert says: "The Stuxnet worm is a wake-up call to governments
around the world--- It is the first known worm to target industrial control
systems" 

Stuxnet finds another victim // Source: itp.net

Stuxnet is feared by experts around the globe as it can break into computers
that control machinery at the heart of industry, allowing an attacker to
assume control of critical systems like pumps, motors, alarms, and valves.

AFP reports
<http://www.google.com/hostednews/afp/article/ALeqM5iFRHUmI2w6HaAFZq-wUNre81
3wcA?docId=CNG.f6fba55ad8f5e329c0c25bad9aa7b8d3.651>  that it could,
technically, make factory boilers explode, destroy gas pipelines, or even
cause a nuclear plant to malfunction.

The virus targets control systems made by German industrial giant Siemens
commonly used to manage water supplies, oil rigs, power plants and other
industrial facilities.

"This malware is specially designed to sabotage plants and damage industrial
systems, instead of stealing personal data," an engineer surnamed Wang at
antivirus service provider Rising International Software told the Global
Times. "Once Stuxnet successfully penetrates factory computers in China,
those industries may collapse, which would damage China's national
security," he added.

Another unnamed expert at Rising International said the attacks had so far
infected more than six million individual accounts and nearly 1,000
corporate accounts around the country, the official Xinhua news agency
reported.

The Stuxnet computer worm - a piece of malicious software (malware) which
copies itself and sends itself on to other computers in a network - was
first publicly identified in June.

It was found lurking on Siemens systems in India, Indonesia, Pakistan and
elsewhere, but the heaviest infiltration appears to be in Iran, according to
software security researchers.

A Beijing-based spokesman for Siemens declined to comment when contacted by
AFP on Thursday.

Yu Xiaoqiu, an analyst with the China Information Technology Security
Evaluation Centre, downplayed the malware threat. "So far we don't see any
severe damage done by the virus," Yu was quoted by the Global Times as
saying.

"New viruses are common nowadays. Both personal Internet surfers and Chinese
pillar companies don't need to worry about it at all. They should be alert
but not too afraid of it."

A top U.S. cybersecurity official said last week that the country was
analyzing the computer worm but did not know who was behind it or its
purpose. "One of our hardest jobs is attribution and intent," Sean McGurk,
director of the National Cybersecurity and Communications Integration Center
(NCCIC), told reporters in Washington. "It's very difficult to say 'This is
what it was targeted to do,'" he said of Stuxnet, which some computer
security experts have said may be intended to sabotage a nuclear facility in
Iran.

A cyber superweapon is a term used by experts to describe a piece of malware
designed specifically to hit computer networks that run industrial plants.
"The Stuxnet worm is a wake-up call to governments around the world," Derek
Reveron, a cyber expert at the U.S. Naval War School, was quoted as saying
Thursday by the South China Morning Post. "It is the first known worm to
target industrial control systems."

 



[Non-text portions of this message have been removed]



------------------------------------

--------------------------
Want to discuss this topic?  Head on over to our discussion list, 
[email protected].
--------------------------
Brooks Isoldi, editor
[email protected]

http://www.intellnet.org

  Post message: [email protected]
  Subscribe:    [email protected]
  Unsubscribe:  [email protected]


*** FAIR USE NOTICE. This message contains copyrighted material whose use has 
not been specifically authorized by the copyright owner. OSINT, as a part of 
The Intelligence Network, is making it available without profit to OSINT 
YahooGroups members who have expressed a prior interest in receiving the 
included information in their efforts to advance the understanding of 
intelligence and law enforcement organizations, their activities, methods, 
techniques, human rights, civil liberties, social justice and other 
intelligence related issues, for non-profit research and educational purposes 
only. We believe that this constitutes a 'fair use' of the copyrighted material 
as provided for in section 107 of the U.S. Copyright Law. If you wish to use 
this copyrighted material for purposes of your own that go beyond 'fair use,' 
you must obtain permission from the copyright owner.
For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtmlYahoo! Groups Links

<*> To visit your group on the web, go to:
    http://groups.yahoo.com/group/osint/

<*> Your email settings:
    Individual Email | Traditional

<*> To change settings online go to:
    http://groups.yahoo.com/group/osint/join
    (Yahoo! ID required)

<*> To change settings via email:
    [email protected] 
    [email protected]

<*> To unsubscribe from this group, send an email to:
    [email protected]

<*> Your use of Yahoo! Groups is subject to:
    http://docs.yahoo.com/info/terms/

Reply via email to