6. SUMMARY
● Discovery of Stuxnet
● Better understand the case
of the Stuxnet worm and its
effects.
● Precise event that occurs in
cyberspace and impacts on
the physical world.
● Defense against such
attacks
SECURITY
9. Designed to destroy the
centrifuges. Iran was using
to enrich uranium as part
of its nuclear program
What did Stuxnet
do?
The intelligence
agencies of the United
States and Israel
Who created
Stuxnet?
Exploited 4 zero-day
bugs in the Siemens
PLCs.
What vulnerability did
Stuxnet exploit?
Virus succeeded in its
goal of disrupting the
Iranian nuclear program
Was Stuxnet
successful?
Written in multiple
languages, including C, C++,
and probably several other
object-oriented languages
What language was
Stuxnet written in?
12. SUMMARY OF FINDINGS
Findings
First worm known to attack SCADA
Uses peer-to-peer transfer
Uses four different vulnerabilities to affect
systems
900-1000 centrifuges were destroyed by
Stuxnet.
The infamous Stuxnet was discovered in 2010, but
had been active since at least 2009
13.
14. DISTRIBUTION OF INFECTED SYSTEMS
WITH SIEMENS SOFTWARE
Iran-67.60
South Korea- 8.10
USA-4.98
Great Britain- 2.18
Indonesia-2.18
India- 1.25
Others- 12.15
17. DISCUSSION
Represents a new
generation of ‘fire-
and-forget’.
Targets were ‘air-
gapped’.
Some computers
were infected by
inserting a
memory stick
Damage in
countries such as
India, which had a
satellite affected.
Represents a new
generation of ‘fire-
and-forget’
18. AFTER EFFECTS
After
Stuxnet
Four years
Seven Years
1)
2)
3)
1)
The Havex intelligence-
gathering attacks
malware designed to
attack industrial
systems
An attempt to harvest
intelligence
Industroyer, the
biggest threat to
industrial control
systems
attacking power grids
automatically
3)
21. ● Requires a Microsoft fix(patch)
● Passwords
● An antivirus - “VirusBlokAda”
● Set up a layered defense
● User privileges should be very strict
● Redundancy must be incorporated
OTHER SOLUTIONS TO PREVENT THE ATTACK
24. REFERENCES
Seven years after Stuxnet: Industrial systems security
once again in the spotlight | WeLiveSecurity
Stuxnet worm (slideshare.net), Slideshare
What's Next in Cybersecurity Policy (slideshare.net),
Slideshare
Stuxnet and the Future of Cyber War (duke.edu), by
James P. Farwell and Rafal Rohozinski
The Story Behind The Stuxnet Virus (forbes.com), the
Forbes
The Stuxnet Attack - GeeksforGeeks, GeeksForGeeks
PPT - The New Generation of Targeted Attacks
PowerPoint Presentation, free download - ID:3831852
(slideserve.com), Slideserve