StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

History of the Stuxnet Worm - Research Paper Example

Cite this document
Summary
The paper "History of the Stuxnet Worm" highlights that the political implications of the release of the Stuxnet Worm by an organization or an individual belonging to a particular country would be immense. It would be identified as a terrorist attack…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92% of users find it useful
History of the Stuxnet Worm
Read Text Preview

Extract of sample "History of the Stuxnet Worm"

? 2 October Research Paper: The Stuxnet Worm History of the Stuxnet Worm A security company named VirusBlokAda first identified the Stuxnet worm around the mid of June in 2010. The first report about the Stuxnet worm that was widely spread and read was the blog posting by the Journalist Brian Krebs that he made on 15 July 2010. The worm derives its name from the keywords found in the software. The virus was discovered when a programming error made during the update spread the worm accidentally beyond the Natanz plant which was its original target. As a result of this accident, the worm spread to the computer of an engineer which got hooked up to the centrifuges. As the engineer hooked the computer to the Internet, the worm spread far and wide. How the Stuxnet Worm Spread The Stuxnet worm started to spread in March 2010, but it took its first variant about three months from then to appear. As people learnt about the existence of the worm on 15 July 2010, the servers for two mailing lists were attacked with the distributed denial-of-service on the industrial-systems security. Although at that time, the source of attack could not be worked out, yet it was suspected to be the Stuxnet worm. As a result of the attack, one of the two mailing lists got disabled, thus interrupting a very important informative source for the factories and the power plants. Two more variants of the Stuxnet worm surfaced; the first in March 2010 and the second in April 2010. In the authors’ opinion, the second and substantially improved variant showed up because of slow progression of the Stuxnet worm. The third variant that surfaced in April 2010 had only minor improvements. There is a build time-stamp in thee worm that starts from 3 February 2010. According to the report delivered by the Sky News on 25 November 2010 in the United Kingdom, an anonymous source whose IT security organization was also unidentified sent the news to Sky News that the black market had received a variation of the Stuxnet worm, but there was lack of consensus among the security experts over this matter. How the Stuxnet Worm Works Stuxnet makes use of vulnerability just like Windows uses the shortcut files to expand to new systems. The Stuxnet worm’s design was bottom-up so that it could effectively attack the systems implemented for the management of industrial networks like chemical manufacturing facilities and power plants as well as the systems of Supervisory Control and Data Acquisition (SCADA). In the start, the Stuxnet worm was thought to progress through such removable drives as USB sticks. However, about two weeks after the Stuxnet worm was first identified, researchers of the Kaspersky Lab working in Moscow found that an unknown security flaw in the sharing of printer resources by the Windows could also help the Stuxnet worm spread. Microsoft found a way to fix this vulnerability with MS10-061 which varies in risk from one type of windows to another. “At least one aspect of what Stuxnet does is to take control of the process and to be able to do…whatever the author or programmer wants it to do. This has potentially devastating consequences, and there needs to be a lot more attention focused on it” (Weiss cited in “‘Stuxnet’ Worm Far”). The Target of the Stuxnet Worm The main target of the Stuxnet worm is the Siemens software. One trait that distinguishes the Stuxnet worm from most viruses that have been identified to date is that it remains silent till the time the worm locates Siemens software in the Windows system. Once the Siemens software is found, the Stuxnet worm exploits up to four 0-day attacks. The Stuxnet worm infected the SCADA systems in 14 functional plants of Siemens, though the infections could not hold the infected plants’ productions. According to the IDG News reports, the Stuxnet worm has infected systems at the Siemens plants in North America, Korea, and the UK, while the maximum infections have so far been made in the plants operating in Iran (Lucarelli). The Stuxnet worm attacks specific systems only and has safeguards that ensure that the worm does not spread to more than three computers from the infected computer. The worm has been configured in such a way that it removes itself on 24 June 2012. An analyst at the Kaspersky Lab reported that the writer of the Stuxnet worm knows the way to configure the SCADA systems. In addition to targeting the SCADA systems of Siemens, the Stuxnet worm also produced the legitimate digital signatures of the industrial giants JMicron and Realtek Semiconductor Corp. on two critical files. The Windows vulnerability patched by Microsoft in the year 2008 was leveraged by the Stuxnet worm. According to a senior anti-virus researcher working at the Kaspersky Lab, Roel Schouwenberg, the purpose behind including the antiquated vulnerability by the designers of the Stuxnet worm was not clear. He said, “If you look at the way they must have organized the entire attack, it’s very impressive. These guys are absolutely top of the line in terms of sophistication” (Schouwenberg cited in “‘Stuxnet’ Worm Far”). The Impact of the Stuxnet Worm The managing partner Joe Weiss serving at the Cupertino, which is California based Applied Control Systems shared that a lot of people have been fixated on the impact of the Stuxnet worm upon the systems of Microsoft Windows, and are unaware of the use of the Stuxnet worm by its authors as a way to end. Controlling the Stuxnet worm is very intricate because not much is known about the credibility of the controllers themselves. The Department of Homeland Security faced numerous challenges in its attempt to achieve control over the Stuxnet worm and the responsible organization causing it. Weiss expressed this concern in these words: “The Department of Homeland Security put out an advisory on Stuxnet on September 2nd, and the only two things it didn’t say anything about is how to find it or get rid of it at the PLC level. People are focusing on what they know and understand, which are the standard Microsoft vulnerabilities. But that’s not the scary part. The really scary thing is that right now we don’t even know which controllers are trusted and which ones aren’t trusted” (Weiss cited in Gobbetti). The Origin of the Stuxnet Worm There are different views about the origin of the Stuxnet worm, and no objective evidence against a particular organization, country, or individual has been obtained so far. According to the journalist David Sanger, governments of Israel and the USA both share the responsibility of developing and deploying the Stuxnet worm (Anderson). “Stuxnet may have averted a nuclear conflagration by diminishing Israel’s perception of a need for an imminent attack on Iran” (Rosenbaum). The International Ramifications of the Stuxnet Worm The Stuxnet worm seems to be released by a nation targeting the infrastructure or research in other nations, particularly Iran and Indonesia. It can be seen from Fig. 1, that the Stuxnet worm attempts made in Iran and Indonesia far outweigh those made in other countries across the globe. Since both Iran and Indonesia are Muslim countries, it essentially seems like a way to hinder the research and development in the Muslim countries. Fig. 1: “Geographic saturation of Stuxnet infection attempts” (Saade). The political implications of the release of the Stuxnet Worm by an organization or an individual belonging to a particular country would be immense. It would be identified as a terrorist attack and there would have been immense pressure on the country to locate the responsible organization or individual and make them pay for the loss they have caused and have attempted to cause. Works Cited: Anderson, Nate. “Confirmed: US and Israel created Stuxnet, lost control of it.” 1 June 2012. Web. 3 Oct. 2012. . Gobbetti, Daniele. “‘Stuxnet’ Worm Far More Sophisticated Than Previously Thought – Krebs on Security.” 15 Sep. 2010. Web. 2 Oct. 2012. . Lucarelli, Fosco. “Stuxnet: Anatomy of the first weapon made entirely out of code.” 17 July 2012. Web. 2 Oct. 2012. . Rosenbaum, Ron. “Richard Clarke on Who Was Behind the Stuxnet Attack.” Smithsonian Magazine. April 2012. Web. 3 Oct. 2012. . Saade, Tareq. “The Stuxnet Sting.” 16 July 2010. Web. 3 Oct. 2012. . “’Stuxnet’ Worm Far More Sophisticated Than Previously Thought.” Krebs on Security. 2012. Web. 2 Oct. 2012. . Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“STUXNET Research Paper Example | Topics and Well Written Essays - 1250 words”, n.d.)
STUXNET Research Paper Example | Topics and Well Written Essays - 1250 words. Retrieved from https://studentshare.org/information-technology/1457850-stuxnet
(STUXNET Research Paper Example | Topics and Well Written Essays - 1250 Words)
STUXNET Research Paper Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/information-technology/1457850-stuxnet.
“STUXNET Research Paper Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/information-technology/1457850-stuxnet.
  • Cited: 0 times

CHECK THESE SAMPLES OF History of the Stuxnet Worm

Origins and influence of Cumbia on the Colombian culture

This is because Cumbia dance has strong links to the history of the Colombian people and for generations, acted as a melting point for numerous Colombian cultures that defines the national identity of the nation (Wade, 2008 p109).... It is interesting to note that Cumbia reflects the complex history of Colombia and brings out the socio-cultural insights of the Colombian people.... So as part of this project, I hope to uncover important elements of the Colombian culture and history that can help in the quest to get the average student to understand and appreciate other important aspect of Colombian culture that are often not discussed....
11 Pages (2750 words) Research Paper

The Increasing Accounts of the Cases of Attacks on the Cyber Security

Through this, the stuxnet worm keeps itself from getting into the eyes of the security software.... Symantec, the biggest company providing security software for computers, reported in August 2010 that 'almost 60% of the targeted computers by the stuxnet worm were in Iran' (Carvey, 2011).... On November 29, Siemens said that the worm only attacked and infected those Iran programs that prohibited Siemens products confidentially damaged by the stuxnet worm....
7 Pages (1750 words) Research Paper

History of a 10th grade reader

This report uses three different readability evaluation tools, the Fry readability graph, the SMOG formula and Flesch-Kincaid grade-level score, along with the Bader textbook analysis chart, to determine the utility of a three different world history textbooks for a ninth grade classroom.... The results of these metrics were then used to pick the optimal world history textbook for the tenth grade.... World history: Patterns of Interaction Patterns of Interaction (figure 1) was evaluated using all of the above methods....
4 Pages (1000 words) Coursework

History and political science

He thus concluded that the ease at which to access such materials determines the nature of a society hence the birth of the phrase history of humanity.... A number of historical theorists contributed significantly to understanding history.... history and political science Name: Instructor: Task: Date: A number of historical theorists contributed significantly to understanding history.... Numerous reasons are accountable for the difference in interpretations of history as depicted by varied historians....
4 Pages (1000 words) Essay

Much To Learn From History

The author of this paper explains his passion for the history and clearly shows that history can be a subject that has many layers in which people can learn and grow as human beings.... The researcher tells about his own steps in history.... found very early on that history would be the right subject matter for me to study.... The chance to enter the historical record through the written works of many other historians had and continues to have a great impact on me as I continue my quest for an increased understanding of everything that has to do with history....
5 Pages (1250 words) Essay

Social history-German student movement

After serving as a minister for Foreign Affairs during the Third Reich, Kurt Georg Kiesinger was, in 1966, fortunate to be vested with the responsibility of leading the Christian Democrats (CDU)/Social Democratic Party (SPD) Grand Coalition government.... However, little did he.... ... ... One such revolution was the German Student Movement which was organized by the university students between June 1966 and May 1968 purposely to condemn the Although it finally declined in 1968, the movement brought lots of changes that are still felt in Germany's education, culture, politics and economy up to the present times....
8 Pages (2000 words) Research Paper

The propinquity of exploratory history and anecdotal history

This essay describes history needs to manage the imperceptible realities and gathering of the pieces, and in the meantime its advantage is established in hard truths .... To this end, for the logical student of history observational occasions of history rule over every single other thought.... history challenges the routines for customary history composing and looks for reality in measurements of human experience....
4 Pages (1000 words) Essay

How the Learning Practice Proposes the Student Needed Skills to Deal with Any Form of Assessment

The study in this instance would seek to isolate a tenth-year student taking history.... The project report then seeks to identify the particular shortcomings of Tiara a year 10 history Student in Queensland.... ypothetical StudentTiara is a history Student of Year 10 under the Australian Curriculum and assessment program....
8 Pages (2000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us