http://homelandsecuritynewswire.com/stuxnet-worlds-first-cyber-superweapon-a ttacks-china
Stuxnet, world's first "cyber superweapon," attacks China Published 1 October 2010 Stuxnet, the most sophisticated malware ever designed, could make factory boilers explode, destroy gas pipelines, or even cause a nuclear plant to malfunction; experts suspect it was designed by Israeli intelligence programmers to disrupt the operations of Iran's nuclear facilities -- especially that country's centrifuge farms and the nuclear reactor in Bushehr; it has now infected Chinese industrial control systems as well; one security expert says: "The Stuxnet worm is a wake-up call to governments around the world--- It is the first known worm to target industrial control systems" Stuxnet finds another victim // Source: itp.net Stuxnet is feared by experts around the globe as it can break into computers that control machinery at the heart of industry, allowing an attacker to assume control of critical systems like pumps, motors, alarms, and valves. AFP reports <http://www.google.com/hostednews/afp/article/ALeqM5iFRHUmI2w6HaAFZq-wUNre81 3wcA?docId=CNG.f6fba55ad8f5e329c0c25bad9aa7b8d3.651> that it could, technically, make factory boilers explode, destroy gas pipelines, or even cause a nuclear plant to malfunction. The virus targets control systems made by German industrial giant Siemens commonly used to manage water supplies, oil rigs, power plants and other industrial facilities. "This malware is specially designed to sabotage plants and damage industrial systems, instead of stealing personal data," an engineer surnamed Wang at antivirus service provider Rising International Software told the Global Times. "Once Stuxnet successfully penetrates factory computers in China, those industries may collapse, which would damage China's national security," he added. Another unnamed expert at Rising International said the attacks had so far infected more than six million individual accounts and nearly 1,000 corporate accounts around the country, the official Xinhua news agency reported. The Stuxnet computer worm - a piece of malicious software (malware) which copies itself and sends itself on to other computers in a network - was first publicly identified in June. It was found lurking on Siemens systems in India, Indonesia, Pakistan and elsewhere, but the heaviest infiltration appears to be in Iran, according to software security researchers. A Beijing-based spokesman for Siemens declined to comment when contacted by AFP on Thursday. Yu Xiaoqiu, an analyst with the China Information Technology Security Evaluation Centre, downplayed the malware threat. "So far we don't see any severe damage done by the virus," Yu was quoted by the Global Times as saying. "New viruses are common nowadays. Both personal Internet surfers and Chinese pillar companies don't need to worry about it at all. They should be alert but not too afraid of it." A top U.S. cybersecurity official said last week that the country was analyzing the computer worm but did not know who was behind it or its purpose. "One of our hardest jobs is attribution and intent," Sean McGurk, director of the National Cybersecurity and Communications Integration Center (NCCIC), told reporters in Washington. "It's very difficult to say 'This is what it was targeted to do,'" he said of Stuxnet, which some computer security experts have said may be intended to sabotage a nuclear facility in Iran. A cyber superweapon is a term used by experts to describe a piece of malware designed specifically to hit computer networks that run industrial plants. "The Stuxnet worm is a wake-up call to governments around the world," Derek Reveron, a cyber expert at the U.S. Naval War School, was quoted as saying Thursday by the South China Morning Post. "It is the first known worm to target industrial control systems." [Non-text portions of this message have been removed] ------------------------------------ -------------------------- Want to discuss this topic? Head on over to our discussion list, [email protected]. -------------------------- Brooks Isoldi, editor [email protected] http://www.intellnet.org Post message: [email protected] Subscribe: [email protected] Unsubscribe: [email protected] *** FAIR USE NOTICE. This message contains copyrighted material whose use has not been specifically authorized by the copyright owner. OSINT, as a part of The Intelligence Network, is making it available without profit to OSINT YahooGroups members who have expressed a prior interest in receiving the included information in their efforts to advance the understanding of intelligence and law enforcement organizations, their activities, methods, techniques, human rights, civil liberties, social justice and other intelligence related issues, for non-profit research and educational purposes only. We believe that this constitutes a 'fair use' of the copyrighted material as provided for in section 107 of the U.S. Copyright Law. If you wish to use this copyrighted material for purposes of your own that go beyond 'fair use,' you must obtain permission from the copyright owner. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtmlYahoo! Groups Links <*> To visit your group on the web, go to: http://groups.yahoo.com/group/osint/ <*> Your email settings: Individual Email | Traditional <*> To change settings online go to: http://groups.yahoo.com/group/osint/join (Yahoo! ID required) <*> To change settings via email: [email protected] [email protected] <*> To unsubscribe from this group, send an email to: [email protected] <*> Your use of Yahoo! Groups is subject to: http://docs.yahoo.com/info/terms/
