SlideShare a Scribd company logo
1 of 20
Download to read offline
Stuxnet 01
A worm that Saved
or Almost Started
WW3?
Objectives
Computer Malware
Understand Stuxnet
History
How it changed everything
02
03
The
Stuxnet
Worm vs Virus
04
A computer worm is a
standalone malware computer
program that replicates itself in
order to spread to other
computers.
A computer virus is a type of
malware that propagates by
inserting a copy of itself into and
becoming part of another
program
05 WHAT IS STUXNET
Stuxnet is a computer worm that was originally aimed at Iran's
nuclear facilities and has since mutated and spread to other
industrial and energy-producing facilities. The original Stuxnet
malware attack targeted the programmable logic controllers
(PLCs) used to automate machine processes.
06
Targeted industrial control systems for equipment made
by Siemens.
These systems are used in Iran for uranium
enrichment
– Enriched uranium is required to make a nuclear
bomb
The aim of the worm was to damage or destroy
controlled equipment
What was it for
07
A Very Sophisticated and
Expensive Worm
Contained Four Zero days
Was 20 more complex and larger than a normal virus
Contained almost no bugs
Highly dense where each code did something and
did something right
At least a Nation-state involved
09 Worm Actions
Takes over operation of the centrifuge from the SCADA
(Supervisory control and data acquisition) controller
Sends control signals to PLCs managing the equipment
Causes the spin speed of the centrifuges to vary wildly, very
quickly, causing extreme vibrations and consequent damage
Blocks signals and alarms to control center from local PLCs
10
The myth of the air gap
Centrifuge control systems were not connected to
the internet
Initial infection thought to be through infected USB
drives taken into the plant by unwitting system
operators
– Beware of freebies!
11
Damage caused
It is thought that between 900 and 1000 centrifuges
were destroyed by the actions of Stuxnet
• This is about 10% of the total so if the intention was
to destroy all centrifuges, then it was not successful
• Significant slowdown in nuclear enrichment
program because of (a) damage and (b)
enrichment shutdown while the worms were cleared
from equipment
12
A Big Controversy
Because of the complexity of the worm, the
number of possible vulnerabilities that are
exploited, the access to expensive
centrifuges and the very specific targeting, it
has been suggested that this is an instance
of cyberwar by nation-states against Iran
13
Unproven speculations
Because Stuxnet did not only affect computers in
nuclear facilities but spread beyond them by transfers
of infected PCs, a mistake was made in its
development
• There was no intention for the worm to spread
beyond Iran
• Other countries with serious infections include
India, Indonesia and Azerbaijhan
Who developed Stuxnet?


It's now widely accepted that Stuxnet was created by the
intelligence agencies of the United States and Israel. The classified
program to develop the worm was given the code name
"Operation Olympic Games"; it was begun under President George
W. Bush and continued under President Obama


14
The Stuxnet worm is a multipurpose worm and there are a range
of versions with different functionality in the wild
• These use the same vulnerabilities to infect systems but they
behave in different ways
15
Is it still active?
16
One called Duqu has significantly
affected computers, especially in Iran.


This does not damage equipment but
logs keystrokes and sends confidential
information to outside servers.
That concludes my presentation.
However, I’d like to quickly summarize
the main points or takeaways.
17
If anyone has any questions, please
feel free to ask now




18
And that brings us to the end. I’d like
to Thank you for your time and
attention today.
19
References
https://www.avast.com/
https://threats.kaspersky.com/
Zero Days 2016 (Documentry)
20

More Related Content

What's hot

Stuxnet, a malicious computer worm
Stuxnet, a malicious computer wormStuxnet, a malicious computer worm
Stuxnet, a malicious computer wormSumaiya Ismail
 
The World's First Cyber Weapon - Stuxnet
The World's First Cyber Weapon - StuxnetThe World's First Cyber Weapon - Stuxnet
The World's First Cyber Weapon - StuxnetSean Xie
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 
Advanced Persistent Threat
Advanced Persistent ThreatAdvanced Persistent Threat
Advanced Persistent ThreatAmmar WK
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malwareamiable_indian
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]David Sweigert
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security pptSAIKAT BISWAS
 
Stopping zero day threats
Stopping zero day threatsStopping zero day threats
Stopping zero day threatsZscaler
 
5 Network Security Threats Facing Businesses Today
5 Network Security Threats Facing Businesses Today5 Network Security Threats Facing Businesses Today
5 Network Security Threats Facing Businesses TodayVelocity Network Solutions
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 ChallengesLeandro Bennaton
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoorsGaurav Dalvi
 
Network security
Network securityNetwork security
Network securityEstiak Khan
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detectionUmesh Dhital
 

What's hot (20)

Stuxnet, a malicious computer worm
Stuxnet, a malicious computer wormStuxnet, a malicious computer worm
Stuxnet, a malicious computer worm
 
The World's First Cyber Weapon - Stuxnet
The World's First Cyber Weapon - StuxnetThe World's First Cyber Weapon - Stuxnet
The World's First Cyber Weapon - Stuxnet
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Pegasus, A spyware
Pegasus, A spywarePegasus, A spyware
Pegasus, A spyware
 
Advanced Persistent Threat
Advanced Persistent ThreatAdvanced Persistent Threat
Advanced Persistent Threat
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Security threats
Security threatsSecurity threats
Security threats
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
PHISHING PROTECTION
PHISHING PROTECTIONPHISHING PROTECTION
PHISHING PROTECTION
 
Malware
MalwareMalware
Malware
 
Cyber kill chain
Cyber kill chainCyber kill chain
Cyber kill chain
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
 
Stopping zero day threats
Stopping zero day threatsStopping zero day threats
Stopping zero day threats
 
5 Network Security Threats Facing Businesses Today
5 Network Security Threats Facing Businesses Today5 Network Security Threats Facing Businesses Today
5 Network Security Threats Facing Businesses Today
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 Challenges
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoors
 
Network security
Network securityNetwork security
Network security
 
Application security
Application securityApplication security
Application security
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 

Similar to Stuxnet

The stuxnet computer worm. harbinger of an emerging warfare capability
The stuxnet computer worm. harbinger of an emerging warfare capabilityThe stuxnet computer worm. harbinger of an emerging warfare capability
The stuxnet computer worm. harbinger of an emerging warfare capabilityYury Chemerkin
 
Stuxnet update 15_feb2011
Stuxnet update 15_feb2011Stuxnet update 15_feb2011
Stuxnet update 15_feb2011AngelaHoltby
 
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...Cybersecurity Education and Research Centre
 
Cybersecurity and-cyberwar-singer-en-22186
Cybersecurity and-cyberwar-singer-en-22186Cybersecurity and-cyberwar-singer-en-22186
Cybersecurity and-cyberwar-singer-en-22186Avirot Mitamura
 
Mag-Securs No.29, 2011 - Validy: Learning from the Stuxnet Case
Mag-Securs No.29, 2011 - Validy: Learning from the Stuxnet CaseMag-Securs No.29, 2011 - Validy: Learning from the Stuxnet Case
Mag-Securs No.29, 2011 - Validy: Learning from the Stuxnet CaseNeelabh Rai
 
final paperpower pointNeed powerpoint(ppt) of 10 s.docx
final paperpower pointNeed powerpoint(ppt) of 10 s.docxfinal paperpower pointNeed powerpoint(ppt) of 10 s.docx
final paperpower pointNeed powerpoint(ppt) of 10 s.docxtjane3
 
Ids 006 computer worms
Ids 006 computer wormsIds 006 computer worms
Ids 006 computer wormsjyoti_lakhani
 
The story behind the stuxnet virus bruce schneier
The story behind the stuxnet virus bruce schneierThe story behind the stuxnet virus bruce schneier
The story behind the stuxnet virus bruce schneierAykut Özmen
 
Presentation Slide: Computer Virus
Presentation Slide: Computer VirusPresentation Slide: Computer Virus
Presentation Slide: Computer VirusYo Maruf
 
Ceh v8 labs module 07 viruses and worms
Ceh v8 labs module 07 viruses and wormsCeh v8 labs module 07 viruses and worms
Ceh v8 labs module 07 viruses and wormsMehrdad Jingoism
 
2011 modeling and detection of camouflaging worm
2011   modeling and detection of camouflaging worm2011   modeling and detection of camouflaging worm
2011 modeling and detection of camouflaging wormdeepikareddy123
 

Similar to Stuxnet (20)

Stuxnets
StuxnetsStuxnets
Stuxnets
 
The stuxnet computer worm. harbinger of an emerging warfare capability
The stuxnet computer worm. harbinger of an emerging warfare capabilityThe stuxnet computer worm. harbinger of an emerging warfare capability
The stuxnet computer worm. harbinger of an emerging warfare capability
 
Stuxnet update 15_feb2011
Stuxnet update 15_feb2011Stuxnet update 15_feb2011
Stuxnet update 15_feb2011
 
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
 
Cyber
CyberCyber
Cyber
 
Spn year8 notes
Spn year8 notesSpn year8 notes
Spn year8 notes
 
Cyber-what?
Cyber-what?Cyber-what?
Cyber-what?
 
Stuxnet
StuxnetStuxnet
Stuxnet
 
Virus
VirusVirus
Virus
 
Cybersecurity and-cyberwar-singer-en-22186
Cybersecurity and-cyberwar-singer-en-22186Cybersecurity and-cyberwar-singer-en-22186
Cybersecurity and-cyberwar-singer-en-22186
 
SIC_gr5.pptx
SIC_gr5.pptxSIC_gr5.pptx
SIC_gr5.pptx
 
Mag-Securs No.29, 2011 - Validy: Learning from the Stuxnet Case
Mag-Securs No.29, 2011 - Validy: Learning from the Stuxnet CaseMag-Securs No.29, 2011 - Validy: Learning from the Stuxnet Case
Mag-Securs No.29, 2011 - Validy: Learning from the Stuxnet Case
 
final paperpower pointNeed powerpoint(ppt) of 10 s.docx
final paperpower pointNeed powerpoint(ppt) of 10 s.docxfinal paperpower pointNeed powerpoint(ppt) of 10 s.docx
final paperpower pointNeed powerpoint(ppt) of 10 s.docx
 
Ids 006 computer worms
Ids 006 computer wormsIds 006 computer worms
Ids 006 computer worms
 
The story behind the stuxnet virus bruce schneier
The story behind the stuxnet virus bruce schneierThe story behind the stuxnet virus bruce schneier
The story behind the stuxnet virus bruce schneier
 
SCADA White Paper March2012
SCADA White Paper March2012SCADA White Paper March2012
SCADA White Paper March2012
 
Malware
MalwareMalware
Malware
 
Presentation Slide: Computer Virus
Presentation Slide: Computer VirusPresentation Slide: Computer Virus
Presentation Slide: Computer Virus
 
Ceh v8 labs module 07 viruses and worms
Ceh v8 labs module 07 viruses and wormsCeh v8 labs module 07 viruses and worms
Ceh v8 labs module 07 viruses and worms
 
2011 modeling and detection of camouflaging worm
2011   modeling and detection of camouflaging worm2011   modeling and detection of camouflaging worm
2011 modeling and detection of camouflaging worm
 

More from Shishir Aryal

The Relational Database Model
The Relational Database ModelThe Relational Database Model
The Relational Database ModelShishir Aryal
 
Nikola tesla (The master of Lightening)
Nikola tesla (The master of Lightening)Nikola tesla (The master of Lightening)
Nikola tesla (The master of Lightening)Shishir Aryal
 
How does blockchain work
How does blockchain workHow does blockchain work
How does blockchain workShishir Aryal
 
Total quality management
Total quality management Total quality management
Total quality management Shishir Aryal
 
Von-Neumann machine and IAS architecture
Von-Neumann machine and  IAS architectureVon-Neumann machine and  IAS architecture
Von-Neumann machine and IAS architectureShishir Aryal
 
Non verbal communication
Non verbal communicationNon verbal communication
Non verbal communicationShishir Aryal
 
Intercultural communication shishir
Intercultural communication shishirIntercultural communication shishir
Intercultural communication shishirShishir Aryal
 
Public key encryption presentation
Public key encryption presentationPublic key encryption presentation
Public key encryption presentationShishir Aryal
 

More from Shishir Aryal (8)

The Relational Database Model
The Relational Database ModelThe Relational Database Model
The Relational Database Model
 
Nikola tesla (The master of Lightening)
Nikola tesla (The master of Lightening)Nikola tesla (The master of Lightening)
Nikola tesla (The master of Lightening)
 
How does blockchain work
How does blockchain workHow does blockchain work
How does blockchain work
 
Total quality management
Total quality management Total quality management
Total quality management
 
Von-Neumann machine and IAS architecture
Von-Neumann machine and  IAS architectureVon-Neumann machine and  IAS architecture
Von-Neumann machine and IAS architecture
 
Non verbal communication
Non verbal communicationNon verbal communication
Non verbal communication
 
Intercultural communication shishir
Intercultural communication shishirIntercultural communication shishir
Intercultural communication shishir
 
Public key encryption presentation
Public key encryption presentationPublic key encryption presentation
Public key encryption presentation
 

Recently uploaded

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 

Recently uploaded (20)

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 

Stuxnet

  • 1. Stuxnet 01 A worm that Saved or Almost Started WW3?
  • 4. Worm vs Virus 04 A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. A computer virus is a type of malware that propagates by inserting a copy of itself into and becoming part of another program
  • 5. 05 WHAT IS STUXNET Stuxnet is a computer worm that was originally aimed at Iran's nuclear facilities and has since mutated and spread to other industrial and energy-producing facilities. The original Stuxnet malware attack targeted the programmable logic controllers (PLCs) used to automate machine processes.
  • 6. 06 Targeted industrial control systems for equipment made by Siemens. These systems are used in Iran for uranium enrichment – Enriched uranium is required to make a nuclear bomb The aim of the worm was to damage or destroy controlled equipment What was it for
  • 7. 07 A Very Sophisticated and Expensive Worm Contained Four Zero days Was 20 more complex and larger than a normal virus Contained almost no bugs Highly dense where each code did something and did something right At least a Nation-state involved
  • 8.
  • 9. 09 Worm Actions Takes over operation of the centrifuge from the SCADA (Supervisory control and data acquisition) controller Sends control signals to PLCs managing the equipment Causes the spin speed of the centrifuges to vary wildly, very quickly, causing extreme vibrations and consequent damage Blocks signals and alarms to control center from local PLCs
  • 10. 10 The myth of the air gap Centrifuge control systems were not connected to the internet Initial infection thought to be through infected USB drives taken into the plant by unwitting system operators – Beware of freebies!
  • 11. 11 Damage caused It is thought that between 900 and 1000 centrifuges were destroyed by the actions of Stuxnet • This is about 10% of the total so if the intention was to destroy all centrifuges, then it was not successful • Significant slowdown in nuclear enrichment program because of (a) damage and (b) enrichment shutdown while the worms were cleared from equipment
  • 12. 12 A Big Controversy Because of the complexity of the worm, the number of possible vulnerabilities that are exploited, the access to expensive centrifuges and the very specific targeting, it has been suggested that this is an instance of cyberwar by nation-states against Iran
  • 13. 13 Unproven speculations Because Stuxnet did not only affect computers in nuclear facilities but spread beyond them by transfers of infected PCs, a mistake was made in its development • There was no intention for the worm to spread beyond Iran • Other countries with serious infections include India, Indonesia and Azerbaijhan
  • 14. Who developed Stuxnet? It's now widely accepted that Stuxnet was created by the intelligence agencies of the United States and Israel. The classified program to develop the worm was given the code name "Operation Olympic Games"; it was begun under President George W. Bush and continued under President Obama 14
  • 15. The Stuxnet worm is a multipurpose worm and there are a range of versions with different functionality in the wild • These use the same vulnerabilities to infect systems but they behave in different ways 15 Is it still active?
  • 16. 16 One called Duqu has significantly affected computers, especially in Iran. This does not damage equipment but logs keystrokes and sends confidential information to outside servers.
  • 17. That concludes my presentation. However, I’d like to quickly summarize the main points or takeaways. 17
  • 18. If anyone has any questions, please feel free to ask now 18
  • 19. And that brings us to the end. I’d like to Thank you for your time and attention today. 19