SlideShare a Scribd company logo
1 of 25
THE VIRUS THAT
ALMOST STARTED
WW3
SECURITY IN COMPUTING-CASE
STUDY (CE2)
GROUP MEMBERS
Roll no. 22625
PRANJAL
LOTANKAR
Roll no. 22638
ASHISH PAL
Roll no. 22679
NANDINI SAHANI
01
Summary
Introduction
Findings
02
03
04
05
06
Discussion
Recommendations
Conclusion
STATEMENT
“There is nothing Wrong
with being a terrorist, as
long as you win. Then you
write History”
- Paul Watson
SUMMARY
Overview of the case
study
01
SUMMARY
● Discovery of Stuxnet
● Better understand the case
of the Stuxnet worm and its
effects.
● Precise event that occurs in
cyberspace and impacts on
the physical world.
● Defense against such
attacks
SECURITY
INTRODUCTION
02
INTRODUCTION
1
Discovered
in Iranian
computer
2010
2
Uses 4
zero-day
exploits
3
The Natanz
Uranium
Enrichment
Facility
Plant
4
Compromised
USB drives
Designed to destroy the
centrifuges. Iran was using
to enrich uranium as part
of its nuclear program
What did Stuxnet
do?
The intelligence
agencies of the United
States and Israel
Who created
Stuxnet?
Exploited 4 zero-day
bugs in the Siemens
PLCs.
What vulnerability did
Stuxnet exploit?
Virus succeeded in its
goal of disrupting the
Iranian nuclear program
Was Stuxnet
successful?
Written in multiple
languages, including C, C++,
and probably several other
object-oriented languages
What language was
Stuxnet written in?
STUXNET ATTACK
Image reveal how attack
was planted.
SUMMARY OF FINDINGS
Findings
First worm known to attack SCADA
Uses peer-to-peer transfer
Uses four different vulnerabilities to affect
systems
900-1000 centrifuges were destroyed by
Stuxnet.
The infamous Stuxnet was discovered in 2010, but
had been active since at least 2009
DISTRIBUTION OF INFECTED SYSTEMS
WITH SIEMENS SOFTWARE
Iran-67.60
South Korea- 8.10
USA-4.98
Great Britain- 2.18
Indonesia-2.18
India- 1.25
Others- 12.15
DISTRIBUTION
67.6
8.1
4.98 2.18 2.18 1.25
12.15
-10
0
10
20
30
40
50
60
70
80
Iran South
Korea
USA Great
Britain
Indonesia India Others
DISCUSSION
03
DISCUSSION
Represents a new
generation of ‘fire-
and-forget’.
Targets were ‘air-
gapped’.
Some computers
were infected by
inserting a
memory stick
Damage in
countries such as
India, which had a
satellite affected.
Represents a new
generation of ‘fire-
and-forget’
AFTER EFFECTS
After
Stuxnet
Four years
Seven Years
1)
2)
3)
1)
The Havex intelligence-
gathering attacks
malware designed to
attack industrial
systems
An attempt to harvest
intelligence
Industroyer, the
biggest threat to
industrial control
systems
attacking power grids
automatically
3)
RECOMMENDATIONS
04
DEFENSES
● Requires a Microsoft fix(patch)
● Passwords
● An antivirus - “VirusBlokAda”
● Set up a layered defense
● User privileges should be very strict
● Redundancy must be incorporated
OTHER SOLUTIONS TO PREVENT THE ATTACK
CONCLUSION
05
CONCLUSION
Targeted
attacks will
continue in
future
2.
Government
entities,
contractors are
prime targets
1.
Protection
against attacks
are necessary
3.
The impact of this
virus is felt in the
cyber realm to
this very date.
4.
REFERENCES
 Seven years after Stuxnet: Industrial systems security
once again in the spotlight | WeLiveSecurity
 Stuxnet worm (slideshare.net), Slideshare
 What's Next in Cybersecurity Policy (slideshare.net),
Slideshare
 Stuxnet and the Future of Cyber War (duke.edu), by
James P. Farwell and Rafal Rohozinski
 The Story Behind The Stuxnet Virus (forbes.com), the
Forbes
 The Stuxnet Attack - GeeksforGeeks, GeeksForGeeks
 PPT - The New Generation of Targeted Attacks
PowerPoint Presentation, free download - ID:3831852
(slideserve.com), Slideserve
THANK
YOU!

More Related Content

Similar to SIC_gr5.pptx

Future-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threatsFuture-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threatsSteven SIM Kok Leong
 
Thrice Is Nice: Ukraine In Review
Thrice Is Nice: Ukraine In ReviewThrice Is Nice: Ukraine In Review
Thrice Is Nice: Ukraine In ReviewJoe Slowik
 
THE STATE OF THE ICS CYBERSECURITY THREAT LANDSCAPE FOR DIGITAL OILFIELDS
THE STATE OF THE ICS CYBERSECURITY THREAT LANDSCAPE FOR DIGITAL OILFIELDSTHE STATE OF THE ICS CYBERSECURITY THREAT LANDSCAPE FOR DIGITAL OILFIELDS
THE STATE OF THE ICS CYBERSECURITY THREAT LANDSCAPE FOR DIGITAL OILFIELDSiQHub
 
Compromising windows 8 with metasploit’s exploit
Compromising windows 8 with metasploit’s exploitCompromising windows 8 with metasploit’s exploit
Compromising windows 8 with metasploit’s exploitIOSR Journals
 
An evaluation of two host based intrusion prevention systems
An evaluation of two host based intrusion prevention systemsAn evaluation of two host based intrusion prevention systems
An evaluation of two host based intrusion prevention systemsUltraUploader
 
Research of Intrusion Preventio System based on Snort
Research of Intrusion Preventio System based on SnortResearch of Intrusion Preventio System based on Snort
Research of Intrusion Preventio System based on SnortFrancis Yang
 
chapter 8- Management Information Systems Managing the Digital Firm
chapter 8- Management Information Systems Managing the Digital Firmchapter 8- Management Information Systems Managing the Digital Firm
chapter 8- Management Information Systems Managing the Digital FirmMohamad Fathi
 
ISACA SLOVENIA CHAPTER October 2016 - Lubiana
ISACA SLOVENIA CHAPTER October 2016 - LubianaISACA SLOVENIA CHAPTER October 2016 - Lubiana
ISACA SLOVENIA CHAPTER October 2016 - LubianaLuca Moroni ✔✔
 
The Stuxnet Virus FINAL
The Stuxnet Virus FINALThe Stuxnet Virus FINAL
The Stuxnet Virus FINALNicholas Poole
 
(120715) #fitalk the era of cyber sabotage and warfare (case study - stuxnet)
(120715) #fitalk   the era of cyber sabotage and warfare (case study - stuxnet)(120715) #fitalk   the era of cyber sabotage and warfare (case study - stuxnet)
(120715) #fitalk the era of cyber sabotage and warfare (case study - stuxnet)INSIGHT FORENSIC
 
(120715) #fitalk the era of cyber sabotage and warfare (case study - stuxnet)
(120715) #fitalk   the era of cyber sabotage and warfare (case study - stuxnet)(120715) #fitalk   the era of cyber sabotage and warfare (case study - stuxnet)
(120715) #fitalk the era of cyber sabotage and warfare (case study - stuxnet)INSIGHT FORENSIC
 
ECESD201415_ECE-team07-Enokian_FR (1)
ECESD201415_ECE-team07-Enokian_FR (1)ECESD201415_ECE-team07-Enokian_FR (1)
ECESD201415_ECE-team07-Enokian_FR (1)Maria Enokian
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionWilliam McBorrough
 
Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles Cisco Canada
 

Similar to SIC_gr5.pptx (20)

Future-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threatsFuture-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threats
 
Stuxnets
StuxnetsStuxnets
Stuxnets
 
Thrice Is Nice: Ukraine In Review
Thrice Is Nice: Ukraine In ReviewThrice Is Nice: Ukraine In Review
Thrice Is Nice: Ukraine In Review
 
THE STATE OF THE ICS CYBERSECURITY THREAT LANDSCAPE FOR DIGITAL OILFIELDS
THE STATE OF THE ICS CYBERSECURITY THREAT LANDSCAPE FOR DIGITAL OILFIELDSTHE STATE OF THE ICS CYBERSECURITY THREAT LANDSCAPE FOR DIGITAL OILFIELDS
THE STATE OF THE ICS CYBERSECURITY THREAT LANDSCAPE FOR DIGITAL OILFIELDS
 
SCADA White Paper March2012
SCADA White Paper March2012SCADA White Paper March2012
SCADA White Paper March2012
 
Stuxnet worm
Stuxnet wormStuxnet worm
Stuxnet worm
 
In defense of cyberwar
In defense of cyberwarIn defense of cyberwar
In defense of cyberwar
 
Compromising windows 8 with metasploit’s exploit
Compromising windows 8 with metasploit’s exploitCompromising windows 8 with metasploit’s exploit
Compromising windows 8 with metasploit’s exploit
 
An evaluation of two host based intrusion prevention systems
An evaluation of two host based intrusion prevention systemsAn evaluation of two host based intrusion prevention systems
An evaluation of two host based intrusion prevention systems
 
Research of Intrusion Preventio System based on Snort
Research of Intrusion Preventio System based on SnortResearch of Intrusion Preventio System based on Snort
Research of Intrusion Preventio System based on Snort
 
Case study 11
Case study 11Case study 11
Case study 11
 
chapter 8- Management Information Systems Managing the Digital Firm
chapter 8- Management Information Systems Managing the Digital Firmchapter 8- Management Information Systems Managing the Digital Firm
chapter 8- Management Information Systems Managing the Digital Firm
 
ISACA SLOVENIA CHAPTER October 2016 - Lubiana
ISACA SLOVENIA CHAPTER October 2016 - LubianaISACA SLOVENIA CHAPTER October 2016 - Lubiana
ISACA SLOVENIA CHAPTER October 2016 - Lubiana
 
The Stuxnet Virus FINAL
The Stuxnet Virus FINALThe Stuxnet Virus FINAL
The Stuxnet Virus FINAL
 
(120715) #fitalk the era of cyber sabotage and warfare (case study - stuxnet)
(120715) #fitalk   the era of cyber sabotage and warfare (case study - stuxnet)(120715) #fitalk   the era of cyber sabotage and warfare (case study - stuxnet)
(120715) #fitalk the era of cyber sabotage and warfare (case study - stuxnet)
 
(120715) #fitalk the era of cyber sabotage and warfare (case study - stuxnet)
(120715) #fitalk   the era of cyber sabotage and warfare (case study - stuxnet)(120715) #fitalk   the era of cyber sabotage and warfare (case study - stuxnet)
(120715) #fitalk the era of cyber sabotage and warfare (case study - stuxnet)
 
Addressing CIP
Addressing CIPAddressing CIP
Addressing CIP
 
ECESD201415_ECE-team07-Enokian_FR (1)
ECESD201415_ECE-team07-Enokian_FR (1)ECESD201415_ECE-team07-Enokian_FR (1)
ECESD201415_ECE-team07-Enokian_FR (1)
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles
 

Recently uploaded

Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaEADTU
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSAnaAcapella
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文中 央社
 
The Liver & Gallbladder (Anatomy & Physiology).pptx
The Liver &  Gallbladder (Anatomy & Physiology).pptxThe Liver &  Gallbladder (Anatomy & Physiology).pptx
The Liver & Gallbladder (Anatomy & Physiology).pptxVishal Singh
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17Celine George
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdfRich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdfJerry Chew
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxneillewis46
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project researchCaitlinCummins3
 
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfContoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfcupulin
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...EADTU
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....Ritu480198
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSean M. Fox
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportDenish Jangid
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...Nguyen Thanh Tu Collection
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnershipsexpandedwebsite
 

Recently uploaded (20)

Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
The Liver & Gallbladder (Anatomy & Physiology).pptx
The Liver &  Gallbladder (Anatomy & Physiology).pptxThe Liver &  Gallbladder (Anatomy & Physiology).pptx
The Liver & Gallbladder (Anatomy & Physiology).pptx
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdfRich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfContoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 

SIC_gr5.pptx

  • 1. THE VIRUS THAT ALMOST STARTED WW3 SECURITY IN COMPUTING-CASE STUDY (CE2)
  • 2. GROUP MEMBERS Roll no. 22625 PRANJAL LOTANKAR Roll no. 22638 ASHISH PAL Roll no. 22679 NANDINI SAHANI
  • 4. STATEMENT “There is nothing Wrong with being a terrorist, as long as you win. Then you write History” - Paul Watson
  • 5. SUMMARY Overview of the case study 01
  • 6. SUMMARY ● Discovery of Stuxnet ● Better understand the case of the Stuxnet worm and its effects. ● Precise event that occurs in cyberspace and impacts on the physical world. ● Defense against such attacks SECURITY
  • 8. INTRODUCTION 1 Discovered in Iranian computer 2010 2 Uses 4 zero-day exploits 3 The Natanz Uranium Enrichment Facility Plant 4 Compromised USB drives
  • 9. Designed to destroy the centrifuges. Iran was using to enrich uranium as part of its nuclear program What did Stuxnet do? The intelligence agencies of the United States and Israel Who created Stuxnet? Exploited 4 zero-day bugs in the Siemens PLCs. What vulnerability did Stuxnet exploit? Virus succeeded in its goal of disrupting the Iranian nuclear program Was Stuxnet successful? Written in multiple languages, including C, C++, and probably several other object-oriented languages What language was Stuxnet written in?
  • 10. STUXNET ATTACK Image reveal how attack was planted.
  • 11.
  • 12. SUMMARY OF FINDINGS Findings First worm known to attack SCADA Uses peer-to-peer transfer Uses four different vulnerabilities to affect systems 900-1000 centrifuges were destroyed by Stuxnet. The infamous Stuxnet was discovered in 2010, but had been active since at least 2009
  • 13.
  • 14. DISTRIBUTION OF INFECTED SYSTEMS WITH SIEMENS SOFTWARE Iran-67.60 South Korea- 8.10 USA-4.98 Great Britain- 2.18 Indonesia-2.18 India- 1.25 Others- 12.15
  • 15. DISTRIBUTION 67.6 8.1 4.98 2.18 2.18 1.25 12.15 -10 0 10 20 30 40 50 60 70 80 Iran South Korea USA Great Britain Indonesia India Others
  • 17. DISCUSSION Represents a new generation of ‘fire- and-forget’. Targets were ‘air- gapped’. Some computers were infected by inserting a memory stick Damage in countries such as India, which had a satellite affected. Represents a new generation of ‘fire- and-forget’
  • 18. AFTER EFFECTS After Stuxnet Four years Seven Years 1) 2) 3) 1) The Havex intelligence- gathering attacks malware designed to attack industrial systems An attempt to harvest intelligence Industroyer, the biggest threat to industrial control systems attacking power grids automatically 3)
  • 21. ● Requires a Microsoft fix(patch) ● Passwords ● An antivirus - “VirusBlokAda” ● Set up a layered defense ● User privileges should be very strict ● Redundancy must be incorporated OTHER SOLUTIONS TO PREVENT THE ATTACK
  • 23. CONCLUSION Targeted attacks will continue in future 2. Government entities, contractors are prime targets 1. Protection against attacks are necessary 3. The impact of this virus is felt in the cyber realm to this very date. 4.
  • 24. REFERENCES  Seven years after Stuxnet: Industrial systems security once again in the spotlight | WeLiveSecurity  Stuxnet worm (slideshare.net), Slideshare  What's Next in Cybersecurity Policy (slideshare.net), Slideshare  Stuxnet and the Future of Cyber War (duke.edu), by James P. Farwell and Rafal Rohozinski  The Story Behind The Stuxnet Virus (forbes.com), the Forbes  The Stuxnet Attack - GeeksforGeeks, GeeksForGeeks  PPT - The New Generation of Targeted Attacks PowerPoint Presentation, free download - ID:3831852 (slideserve.com), Slideserve