Iran Confirms Nuclear System Hit By Virus
Analysis of a major worm virus that specifically targets industrial control systems shows that three-fifths of the infected machines were in Iran. There's now speculation that the country's nuclear program was the target -- and that a national government might have been the culprit.
It has been known since July that the Stuxnet virus targeted Iran. Over a three-day period that month, 58.85 per cent of all Stuxnet-infected machines were in the country. (Source: symantec.com)
Infrastructure Under Attack
The virus is carefully crafted to breach SCADA (supervisory control and data acquisition) systems used for infrastructure such as large scale communications, distribution, manufacturing and power generation.
What's changed recently is that Iran has confirmed the infection and even admitted its Atomic Energy Organization has had special meetings to discuss how to remove Stuxnet.
Windows "Shortcut Flaw" Exploit The Key
There's something of a consensus in the security community that Stuxnet is among the most sophisticated pieces of malware ever recorded.
PCMag's Larry Seltzer explained that it was the first known attack to exploit the recently discovered "shortcut" flaw in Windows: whenever Stuxnet gets onto a machine, it copies itself to any removable media such as USB drives, creating a shortcut file that will then open as soon as the drive is inserted into another machine, installing the virus. (Source: pcmag.com)
Stuxnet also exploits three other Windows bugs to spread itself, and has compromised at least two digital certificate systems to bypass security checks. Once it gets onto a SCADA system, it attempts to insert malicious code directly into the system's programs, but uses a technique that can't easily be detected.
Zero Day Flaws Exaggerate, Amplify Attacks
It's not just the level of sophistication that suggests this is not the work of an ordinary hacker. The fact that it also uses four different zero day attacks (those which exploit bugs before even Microsoft knows about them and begins working on a fix) has also raised eyebrows.
Normally, a hacker discovering a zero day bug would put their efforts into exploiting it because of the limited time available before a fix was issued; working on two zero-days at the same time is considered wasteful because it divides resources which could otherwise be used to resolve one of the issues sooner.
Invasive Hackery Not Considered Amateur
Some sources have suggested that only a national government might have the resources to carry out such an attack. That theory is gaining ground thanks to rumors that the attack was targeted at Iran's first nuclear power plant, due to open in October of this year.
It should be noted that these two ideas might be self-perpetuating: people may be assuming that if a national government is the attacker, the nuclear power plant must be the target, and vice-versa.
Most popular articles
- Which Processor is Better: Intel or AMD? - Explained
- How to Prevent Ransomware in 2018 - 10 Steps
- 5 Best Anti Ransomware Software Free
- How to Fix: Computer / Network Infected with Ransomware (10 Steps)
- How to Fix: Your Computer is Infected, Call This Number (Scam)
- Scammed by Informatico Experts? Here's What to Do
- Scammed by Smart PC Experts? Here's What to Do
- Scammed by Right PC Experts? Here's What to Do
- Scammed by PC / Web Network Experts? Here's What to Do
- How to Fix: Windows Update Won't Update
- Explained: Do I need a VPN? Are VPNs Safe for Online Banking?
- Explained: VPN vs Proxy; What's the Difference?
- Explained: Difference Between VPN Server and VPN (Service)
- Forgot Password? How to: Reset Any Password: Windows Vista, 7, 8, 10
- How to: Use a Firewall to Block Full Screen Ads on Android
- Explained: Absolute Best way to Limit Data on Android
- Explained: Difference Between Dark Web, Deep Net, Darknet and More
- Explained: If I Reset Windows 10 will it Remove Malware?
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
We are BBB Accredited
We are BBB accredited (A+ rating), celebrating 21 years of excellence! Click to view our rating on the BBB.