Internet Anthropologist Think Tank: Stuxnet Evolves:

  • Search our BLOG


  • HOME
    Terrorist Names SEARCH:
    Loading

    Sunday, April 03, 2011

    Stuxnet Evolves:

    More of our INTEL



    The evolution of Stuxnet has been announced.

    The capibilitues of the Stuxnet, worm, rootkit malware
    are remarkable.

    We have seen its Rootkit facet in hiding the
    truth of what is actually going on with
    the centrifuges. They malfunction by
    order of Stuxnet and it forces the computer
    to report every thing is fine.

    Stuznet could do the opposite.
    Report a machine or part is malfunctioning
    when its fine. Forcing the shut down of that
    component or section till it can be replaced,
    again and again.

    Internet Anthropologist Think Tank: Smoking Gun, Stuxnet architect.
     the suspected Stuxnet architect.
    Has already done that in an exercise setting.
    Deceiving the system operator (or whomever) into thinking that
    the system (e.g. transactional server) is experiencing some type of
    mechanical failure is a very viable attack.

    Back in 2000, he wrote a program that simulated a hardware failure
    on well-known UNIX platform as part of a security/system
    administrator test for a LARGE organization.  his code contained
    valid support numbers, e-mails and error codes.   The "failure"
    notices were randomize and the system "complained" that it was in
    various levels of "panic."  The vendor sent engineers from around
    the US to repair the system.  They replace CPUs, memory chips,
    motherboards and encryption boards.  Sadly nothing corrected the
    "ghost in the machine" problem and the system was offline for two
    weeks (that is when he remove the code).  The security/system teams
    failed the exercise.


    Our paradigm intel has spotted this activity in
    the wild and for Opsec reasons will not be posting
    about it.

    Iran is still fighting with Stuxnet a  IPR ( Invisible Persistent Rootkits )
    We wrote about them 5 mos before Stuxnet was discovered.
    http://warintel.blogspot.com/2010/09/yes-there-are-invisible-persistent.html

    Just as confliker's paradigm allows it to persist even with
    years of efforts to kill it, So to does Stuxnet's paradigm allow
    it to persist regardless of Iran's efforts to remove it.

    also outlined how a modified Stuxnet
    could take control of key systems in Russian tanks.

    Computers As Weapons Of War


    John Bumgarner, Chief Technology Officer of the U.S. Cyber Consequences Unit. 
    Our research and sources have confirmed vulnerabilities
    in the American Electrical infrastructure to Stuxnet type
    cyber attacks.

    And just as Irans centrifuges are susceptible to Stuxnet
    so are all nuclear cooling vulnerable to a Stuxnet type
    attack.

    More of John's unclassified study on the Russian/Georgian
    Cyber Conflict of 2008 was published publicly.   This research is
    being used throughout the world in military universities as a case
    study.

    Below are some of the articles from 2009 that mentioned this
    research:
    http://online.wsj.com/article/SB124701806176209691.html
    http://www.informationweek.com/news/government/security/showArticle. jhtml?articleID=219400248

    http://www.darkreading.com/security/cybercrime/showArticle.jhtml?art icleID=219400367
    http://www.fcw.com/Articles/2009/08/24/WEEK-International-cyber- attack-fears.aspx
    http://www.businessweek.com/blogs/russia_oil_politics/
    http://cnews.ru/news/top/print.shtml?2009/08/17/357988
    http://georgiandaily.com/index.php?option=com_content&task=view&
    amp;id=14121&Itemid=125
    http://www.telegraph.co.uk/technology/6048978/Russia-helped-co- ordinate-attacks-on-Georgian-websites.html
    http://www.federalnewsradio.com/?nid=56&sid=1747752
    http://edition.cnn.com/2009/US/08/17/cyber.warfare/index.html
    http://www.nationalpost.com/blogs/story.html?id=2125907
    http://www.guardian.co.uk/world/2009/jul/08/south-korea-cyber-attack

    http://stage-v2.wtopnews.com/?nid=778&sid=1803720
    http://www.foreignpolicyjournal.com/2009/11/15/brazils-next- battlefield-cyberspace/




    The Wriggling Threat Targeted Attack Scenarios By John Bumgarner

    Published one month prior to the
    worm....outlined how to improve the exploit code from Xfocus and HD
    Moore.  The worm author(s) used the paper to write the
    worm.



    All of which points to the importance of harding civilian
    network against cyber attacks and the importance of
    an cyber offensive force to deter cyber attacks.





    Gerald
    War Anthropologist
    Tactical Internet Systems analyst.




    .

    0 Comments:

    Post a Comment

    Subscribe to Post Comments [Atom]

    << Home