SlideShare a Scribd company logo
Case Study on Stuxnet malware
What is Stuxnet?
• Designed to target industrial control systems for
equipment made by Siemens.
• These components are used for uranium enrichment in
Iran
• AIM: to damage and destroy the controlled
equipment
• First virus of its kind to cause damage to the physical
world instead of the virtual world
• One of the most sophisticated and deadliest virus in
history
• Enriched uranium is required to make a
nuclear bomb
• Local computer at the plant not
connected to the internet
• Malware was physically brought by an
agent carrying an infected USB stick
• The USB stick will then be connected to
the computer in the plant by curious
employees where the worm spreads in
the network
How it is infected?
Since it’s a worm, it propagates by spreading
it to other computers in the network
As mentioned, the virus aims for a specific
component. Until then, it remains dormant
Infographics of the centrifuges
Centrifuges are spinning device that
process enriched uranium
The malware were targeting a component
called programmable logic controller(PLC)
PLC controls the equipment that allows the
worker to monitor and operate using a
software.
Stuxnet’s main target was a PLC that
controlled the centrifuges that processed
enriched uranium
The virus remain dormant until it reaches the PLC that controls the
centrifuges.
Once the virus reaches the PLC, it unleashes its payload into the
component
Stuxnet contains device drivers that were
stolen from sources like Realtek
and Micron digitally signed means
the driver has a trusted certificate
allows the virus to install malicious code
into the controller
without any suspicion
Example of a signed driver
DN
Example of a warming of an unsigned driver
DN
Hence, Stuxnet is a rootkit
The attack
The worm overwrite the PLC software by
infecting the STEP 7 project files, used by
Siemens Simatic Wincc
Once it gain control Stuxnet intercept
all the data coming in and out of the PLC
and also able to alter the data
When there is internet connection available,
the worm’s author will monitor on the
centrifuges
The malware will then destroy the centrifuges
by causing them to spin faster until they break
apart.
All this whilst telling the operator everything is
normal
Outcome of the attack
the cyber-attack undermined the Iranian Nuclear Program by
damaging the centrifuges, slowing their progress for years.
5,084out of 8,856centrifuges were shut down
Origin of the attack
• The U.S. and Israel are involved in the cyber-
attack
• Fearing that Iran will get its hand on nuclear
bomb
• U.S. launched Operation Olympic Games to
undermine the Iran’s nuclear program
• Programmers from Israel military and NSA wrote
the malware
What did Iran do to repair the damage?
Equipment had to be replaced
❖Infected computers
● Computers in nuclear facilities had to be thrown away
● 60% of computers in Iranalso had the virus but are
unaffected. But most probably had to have been disposed.
Statistics of computers affected
Equipment that had to be rebuild
❖Centrifuges
• 1,000 centrifuges were destroyed
• Production of uranium gas went down by 30%
What was learnt?
Globally
• Opened a new form of military attack .It showed that even a
secured nuclear plant was vulnerable of being attacked by a
computer malware.
What did Iran learn?
Iran
• Learnt that their cyber defence was weak and vulnerable. They
learnt the importance of cyber warfare first hand and in turn boost
their cyber force to retaliate against the hackers.
What could have prevented it?
If Iran had…
• Implemented technology called device and application control. This
application prevents unauthorised applications from uploading and
executing.
References
(n.d.). Retrieved from http://avsw.autism.org.sg/2014/img/logos/sp.png
(n.d.). Retrieved from Wallpaper Up:
https://www.wallpaperup.com/455984/STUXNET_virus_iran_nuclear_computer_political_anarchy_windows_microsoft_cyber_
hacker_hacking.html
Best Gallery of Wind Turbine and Power Plant Energy. (n.d.). Retrieved from nevadanscleanenergy:
https://nevadanscleanenergy.org/houston-nuclear-power-plant/superb-houston-nuclear-power-plant-wallpaper/
Iran presses ahead with uranium enrichment technology. (2013, December 7). Retrieved from Yalibnan:
http://yalibnan.com/2013/12/07/iran-presses-ahead-with-uranium-enrichment-technology/
Natanz. (n.d.). Retrieved from Wikipedia: https://en.wikipedia.org/wiki/Natanz
NATANZ ENRICHMENT COMPLEX. (7, July 2017). Retrieved from NTI: http://www.nti.org/learn/facilities/170/
Standford. (2015, July 16). Retrieved from Stuxnet Worm Attack on Iranian Nuclear Facilities:
http://large.stanford.edu/courses/2015/ph241/holloway1/
Stuxnet. (2017, August 10). Retrieved from NJCCIC: https://www.cyber.nj.gov/threat-profiles/ics-malware-variants/stuxnet
Stuxnet and stolen certificates. (2010, July 20). Retrieved from Securelist: https://securelist.com/stuxnet-and-stolen-
certificates/29724/
What is Stuxnet? (n.d.). Retrieved from Caleton: http://people.carleton.edu/~grossea/spread.html
What Is the Stuxnet Worm Computer Virus? (2018, June 16). Retrieved from LifrWire: https://www.lifewire.com/stuxnet-worm-
computer-virus-153570
Why Steal Digital Certificates? (2010, July 22). Retrieved from WeLiveSecurity: https://www.welivesecurity.com/2010/07/22/why-
steal-digital-certificates/
Thank you for your kind attention!

More Related Content

What's hot

The World's First Cyber Weapon - Stuxnet
The World's First Cyber Weapon - StuxnetThe World's First Cyber Weapon - Stuxnet
The World's First Cyber Weapon - Stuxnet
Sean Xie
 
Stuxnet - A weapon of the future
Stuxnet - A weapon of the futureStuxnet - A weapon of the future
Stuxnet - A weapon of the future
Hardeep Bhurji
 
Stuxnet update 15_feb2011
Stuxnet update 15_feb2011Stuxnet update 15_feb2011
Stuxnet update 15_feb2011
AngelaHoltby
 
Stuxnet
StuxnetStuxnet
Stuxnet
shiva_sathish
 
Leone ct#2 presentation rev
Leone ct#2 presentation revLeone ct#2 presentation rev
Leone ct#2 presentation rev
vincentleone
 
Mission Critical Security in a Post-Stuxnet World Part 1
Mission Critical Security in a Post-Stuxnet World Part 1Mission Critical Security in a Post-Stuxnet World Part 1
Mission Critical Security in a Post-Stuxnet World Part 1
Byres Security Inc.
 
Stuxnet
StuxnetStuxnet
Stuxnet
Symantec
 
Stuxnet worm
Stuxnet wormStuxnet worm
Stuxnet worm
sommerville-videos
 
NULL Mumbai NewsBytes
NULL Mumbai NewsBytesNULL Mumbai NewsBytes
NULL Mumbai NewsBytes
VirajThakkar4
 
News bytes null 200314121904
News bytes null 200314121904News bytes null 200314121904
News bytes null 200314121904
n|u - The Open Security Community
 
How stuxnet spreads – a study of infection paths in best practice systems
How stuxnet spreads – a study of infection paths in best practice systemsHow stuxnet spreads – a study of infection paths in best practice systems
How stuxnet spreads – a study of infection paths in best practice systems
Yury Chemerkin
 
Stuxnet mass weopan of cyber attack
Stuxnet mass weopan of cyber attackStuxnet mass weopan of cyber attack
Stuxnet mass weopan of cyber attack
Ajinkya Nikam
 
Cscu module 01 foundations of security
Cscu module 01 foundations of securityCscu module 01 foundations of security
Cscu module 01 foundations of security
Sejahtera Affif
 
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
Dawn Yankeelov
 
I Heart Stuxnet
I Heart StuxnetI Heart Stuxnet
I Heart Stuxnet
Gil Megidish
 
6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford
6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford
6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford
PROFIBUS and PROFINET InternationaI - PI UK
 
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
TI Safe
 
A Diet of Poisoned Fruit: Designing Implants & OT Payloads for ICS Embedded D...
A Diet of Poisoned Fruit: Designing Implants & OT Payloadsfor ICS Embedded D...A Diet of Poisoned Fruit: Designing Implants & OT Payloadsfor ICS Embedded D...
A Diet of Poisoned Fruit: Designing Implants & OT Payloads for ICS Embedded D...
Marina Krotofil
 
A Stuxnet for Mainframes
A Stuxnet for MainframesA Stuxnet for Mainframes
A Stuxnet for Mainframes
Cheryl Biswas
 
News Bytes - May 2015
News Bytes - May 2015News Bytes - May 2015
News Bytes - May 2015
n|u - The Open Security Community
 

What's hot (20)

The World's First Cyber Weapon - Stuxnet
The World's First Cyber Weapon - StuxnetThe World's First Cyber Weapon - Stuxnet
The World's First Cyber Weapon - Stuxnet
 
Stuxnet - A weapon of the future
Stuxnet - A weapon of the futureStuxnet - A weapon of the future
Stuxnet - A weapon of the future
 
Stuxnet update 15_feb2011
Stuxnet update 15_feb2011Stuxnet update 15_feb2011
Stuxnet update 15_feb2011
 
Stuxnet
StuxnetStuxnet
Stuxnet
 
Leone ct#2 presentation rev
Leone ct#2 presentation revLeone ct#2 presentation rev
Leone ct#2 presentation rev
 
Mission Critical Security in a Post-Stuxnet World Part 1
Mission Critical Security in a Post-Stuxnet World Part 1Mission Critical Security in a Post-Stuxnet World Part 1
Mission Critical Security in a Post-Stuxnet World Part 1
 
Stuxnet
StuxnetStuxnet
Stuxnet
 
Stuxnet worm
Stuxnet wormStuxnet worm
Stuxnet worm
 
NULL Mumbai NewsBytes
NULL Mumbai NewsBytesNULL Mumbai NewsBytes
NULL Mumbai NewsBytes
 
News bytes null 200314121904
News bytes null 200314121904News bytes null 200314121904
News bytes null 200314121904
 
How stuxnet spreads – a study of infection paths in best practice systems
How stuxnet spreads – a study of infection paths in best practice systemsHow stuxnet spreads – a study of infection paths in best practice systems
How stuxnet spreads – a study of infection paths in best practice systems
 
Stuxnet mass weopan of cyber attack
Stuxnet mass weopan of cyber attackStuxnet mass weopan of cyber attack
Stuxnet mass weopan of cyber attack
 
Cscu module 01 foundations of security
Cscu module 01 foundations of securityCscu module 01 foundations of security
Cscu module 01 foundations of security
 
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
 
I Heart Stuxnet
I Heart StuxnetI Heart Stuxnet
I Heart Stuxnet
 
6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford
6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford
6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford
 
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
 
A Diet of Poisoned Fruit: Designing Implants & OT Payloads for ICS Embedded D...
A Diet of Poisoned Fruit: Designing Implants & OT Payloadsfor ICS Embedded D...A Diet of Poisoned Fruit: Designing Implants & OT Payloadsfor ICS Embedded D...
A Diet of Poisoned Fruit: Designing Implants & OT Payloads for ICS Embedded D...
 
A Stuxnet for Mainframes
A Stuxnet for MainframesA Stuxnet for Mainframes
A Stuxnet for Mainframes
 
News Bytes - May 2015
News Bytes - May 2015News Bytes - May 2015
News Bytes - May 2015
 

Similar to Stuxnets

CPS - Week 1.pptx
CPS - Week 1.pptxCPS - Week 1.pptx
CPS - Week 1.pptx
SantiagoBrito20
 
Cyber
CyberCyber
Cyber
jarajana
 
Internet worms definitions and strategies to avoid it.
Internet worms definitions and strategies to avoid it.Internet worms definitions and strategies to avoid it.
Internet worms definitions and strategies to avoid it.
SinisaSremac
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
frcarlson
 
Prevention based mechanism for attacks in Network Security
Prevention based mechanism for attacks in Network SecurityPrevention based mechanism for attacks in Network Security
Prevention based mechanism for attacks in Network Security
Editor IJMTER
 
How to Audit
How to AuditHow to Audit
How to Audit
ayousif
 
NewsByte Mumbai October 2017
NewsByte Mumbai October 2017NewsByte Mumbai October 2017
NewsByte Mumbai October 2017
chauhananand17
 
Internet worm-case-study
Internet worm-case-studyInternet worm-case-study
Internet worm-case-study
Ian Sommerville
 
BYOD and Your Business
BYOD and Your BusinessBYOD and Your Business
BYOD and Your Business
cherienetclarity
 
Virus detection based on virus throttle technology
Virus detection based on virus throttle technologyVirus detection based on virus throttle technology
Virus detection based on virus throttle technology
Ahmed Muzammil
 
SCADA Presentation
SCADA PresentationSCADA Presentation
SCADA Presentation
Eric Favetta
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
Alireza Ghahrood
 
Cyber ppt
Cyber pptCyber ppt
Cyber ppt
Mandar Pathrikar
 
SCADA White Paper March2012
SCADA White Paper March2012SCADA White Paper March2012
SCADA White Paper March2012
James Collinge, CISSP
 
Application of hardware accelerated extensible network nodes for internet wor...
Application of hardware accelerated extensible network nodes for internet wor...Application of hardware accelerated extensible network nodes for internet wor...
Application of hardware accelerated extensible network nodes for internet wor...
UltraUploader
 
Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]
Mikko Hypponen
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
EdwinGervacio2
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Hiren Selani
 
chapter 8- Management Information Systems Managing the Digital Firm
chapter 8- Management Information Systems Managing the Digital Firmchapter 8- Management Information Systems Managing the Digital Firm
chapter 8- Management Information Systems Managing the Digital Firm
Mohamad Fathi
 
APT - Project
APT - Project APT - Project
APT - Project
Dev Lavaniya
 

Similar to Stuxnets (20)

CPS - Week 1.pptx
CPS - Week 1.pptxCPS - Week 1.pptx
CPS - Week 1.pptx
 
Cyber
CyberCyber
Cyber
 
Internet worms definitions and strategies to avoid it.
Internet worms definitions and strategies to avoid it.Internet worms definitions and strategies to avoid it.
Internet worms definitions and strategies to avoid it.
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Prevention based mechanism for attacks in Network Security
Prevention based mechanism for attacks in Network SecurityPrevention based mechanism for attacks in Network Security
Prevention based mechanism for attacks in Network Security
 
How to Audit
How to AuditHow to Audit
How to Audit
 
NewsByte Mumbai October 2017
NewsByte Mumbai October 2017NewsByte Mumbai October 2017
NewsByte Mumbai October 2017
 
Internet worm-case-study
Internet worm-case-studyInternet worm-case-study
Internet worm-case-study
 
BYOD and Your Business
BYOD and Your BusinessBYOD and Your Business
BYOD and Your Business
 
Virus detection based on virus throttle technology
Virus detection based on virus throttle technologyVirus detection based on virus throttle technology
Virus detection based on virus throttle technology
 
SCADA Presentation
SCADA PresentationSCADA Presentation
SCADA Presentation
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Cyber ppt
Cyber pptCyber ppt
Cyber ppt
 
SCADA White Paper March2012
SCADA White Paper March2012SCADA White Paper March2012
SCADA White Paper March2012
 
Application of hardware accelerated extensible network nodes for internet wor...
Application of hardware accelerated extensible network nodes for internet wor...Application of hardware accelerated extensible network nodes for internet wor...
Application of hardware accelerated extensible network nodes for internet wor...
 
Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
chapter 8- Management Information Systems Managing the Digital Firm
chapter 8- Management Information Systems Managing the Digital Firmchapter 8- Management Information Systems Managing the Digital Firm
chapter 8- Management Information Systems Managing the Digital Firm
 
APT - Project
APT - Project APT - Project
APT - Project
 

Recently uploaded

Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 

Recently uploaded (20)

Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 

Stuxnets

  • 1. Case Study on Stuxnet malware
  • 2. What is Stuxnet? • Designed to target industrial control systems for equipment made by Siemens. • These components are used for uranium enrichment in Iran • AIM: to damage and destroy the controlled equipment • First virus of its kind to cause damage to the physical world instead of the virtual world • One of the most sophisticated and deadliest virus in history
  • 3. • Enriched uranium is required to make a nuclear bomb • Local computer at the plant not connected to the internet • Malware was physically brought by an agent carrying an infected USB stick • The USB stick will then be connected to the computer in the plant by curious employees where the worm spreads in the network How it is infected?
  • 4. Since it’s a worm, it propagates by spreading it to other computers in the network As mentioned, the virus aims for a specific component. Until then, it remains dormant
  • 5. Infographics of the centrifuges Centrifuges are spinning device that process enriched uranium
  • 6. The malware were targeting a component called programmable logic controller(PLC) PLC controls the equipment that allows the worker to monitor and operate using a software. Stuxnet’s main target was a PLC that controlled the centrifuges that processed enriched uranium
  • 7. The virus remain dormant until it reaches the PLC that controls the centrifuges. Once the virus reaches the PLC, it unleashes its payload into the component
  • 8. Stuxnet contains device drivers that were stolen from sources like Realtek and Micron digitally signed means the driver has a trusted certificate allows the virus to install malicious code into the controller without any suspicion Example of a signed driver DN Example of a warming of an unsigned driver DN Hence, Stuxnet is a rootkit
  • 9. The attack The worm overwrite the PLC software by infecting the STEP 7 project files, used by Siemens Simatic Wincc Once it gain control Stuxnet intercept all the data coming in and out of the PLC and also able to alter the data
  • 10. When there is internet connection available, the worm’s author will monitor on the centrifuges The malware will then destroy the centrifuges by causing them to spin faster until they break apart. All this whilst telling the operator everything is normal
  • 11.
  • 12. Outcome of the attack the cyber-attack undermined the Iranian Nuclear Program by damaging the centrifuges, slowing their progress for years. 5,084out of 8,856centrifuges were shut down
  • 13. Origin of the attack • The U.S. and Israel are involved in the cyber- attack • Fearing that Iran will get its hand on nuclear bomb • U.S. launched Operation Olympic Games to undermine the Iran’s nuclear program • Programmers from Israel military and NSA wrote the malware
  • 14. What did Iran do to repair the damage? Equipment had to be replaced ❖Infected computers ● Computers in nuclear facilities had to be thrown away ● 60% of computers in Iranalso had the virus but are unaffected. But most probably had to have been disposed.
  • 16. Equipment that had to be rebuild ❖Centrifuges • 1,000 centrifuges were destroyed • Production of uranium gas went down by 30%
  • 17. What was learnt? Globally • Opened a new form of military attack .It showed that even a secured nuclear plant was vulnerable of being attacked by a computer malware.
  • 18. What did Iran learn? Iran • Learnt that their cyber defence was weak and vulnerable. They learnt the importance of cyber warfare first hand and in turn boost their cyber force to retaliate against the hackers.
  • 19. What could have prevented it? If Iran had… • Implemented technology called device and application control. This application prevents unauthorised applications from uploading and executing.
  • 20. References (n.d.). Retrieved from http://avsw.autism.org.sg/2014/img/logos/sp.png (n.d.). Retrieved from Wallpaper Up: https://www.wallpaperup.com/455984/STUXNET_virus_iran_nuclear_computer_political_anarchy_windows_microsoft_cyber_ hacker_hacking.html Best Gallery of Wind Turbine and Power Plant Energy. (n.d.). Retrieved from nevadanscleanenergy: https://nevadanscleanenergy.org/houston-nuclear-power-plant/superb-houston-nuclear-power-plant-wallpaper/ Iran presses ahead with uranium enrichment technology. (2013, December 7). Retrieved from Yalibnan: http://yalibnan.com/2013/12/07/iran-presses-ahead-with-uranium-enrichment-technology/ Natanz. (n.d.). Retrieved from Wikipedia: https://en.wikipedia.org/wiki/Natanz NATANZ ENRICHMENT COMPLEX. (7, July 2017). Retrieved from NTI: http://www.nti.org/learn/facilities/170/ Standford. (2015, July 16). Retrieved from Stuxnet Worm Attack on Iranian Nuclear Facilities: http://large.stanford.edu/courses/2015/ph241/holloway1/ Stuxnet. (2017, August 10). Retrieved from NJCCIC: https://www.cyber.nj.gov/threat-profiles/ics-malware-variants/stuxnet Stuxnet and stolen certificates. (2010, July 20). Retrieved from Securelist: https://securelist.com/stuxnet-and-stolen- certificates/29724/ What is Stuxnet? (n.d.). Retrieved from Caleton: http://people.carleton.edu/~grossea/spread.html What Is the Stuxnet Worm Computer Virus? (2018, June 16). Retrieved from LifrWire: https://www.lifewire.com/stuxnet-worm- computer-virus-153570 Why Steal Digital Certificates? (2010, July 22). Retrieved from WeLiveSecurity: https://www.welivesecurity.com/2010/07/22/why- steal-digital-certificates/
  • 21. Thank you for your kind attention!