Archive for October 4, 2010

Stuxnet virus attack on Iranian nuclear programme: the first strike by computer? – Telegraph

October 4, 2010

Stuxnet virus attack on Iranian nuclear programme: the first strike by computer? – Telegraph.

Iran’s nuclear programme has been threatened by a powerful virus distributed through the internet. Richard Spencer reports on a new age of cyber warfare.

By Richard Spencer
Published: 8:31AM BST 04 Oct 2010

On a Vancouver stage last Thursday, a young Irish computing expert gave a filmed presentation showing how the world could end with the pop of a balloon. The presentational qualities are, well, geek-like, the sound quality poor, and the whole experiment has the air of a Year 7 science project. Nevertheless, the YouTube video is spreading like wildfire from one software blog to the next.

In the past few days, the expert, Liam O Murchu, has become the new star of Geek Universe, quoted from PC World to the Washington Post. But unlike most such young men, his impenetrable analyses of computer coding have a frightening relevance to physical realities. Hence his experiment, performed at the Virus Bulletin 2010 conference in Canada.

O Murchu was demonstrating how a computer worm called Stuxnet had effects that went beyond blowing up your computer screen. It could blow up real things, too. Stuxnet has infected operating systems on equipment manufactured by the German industrial giant Siemens and has, as he puts it, “real-world implications beyond any threat we have seen in the past”. It could attack oil pipelines, power stations, even nuclear plants.

To prove the possibilities, O Murchu set up a basic air pump, controlled by a Siemens system, on the stage in front of him. The pump delivered a timed burst of air into a balloon, which inflated moderately. O Murchu then infected the system with Stuxnet, pressed a button, and hey presto! The pump pumped, but did not stop. The balloon went on inflating till it burst.

Imagine if the balloon were, in fact, an Iranian nuclear power station. For that, in essence, is the possibility that has brought O Murchu’s name to public attention.

Stuxnet has been around since last year and its workings were first described four months ago. But such was the size and complexity of its coding that only more recently has its true nature become fully clear. What scores of analysts like O Murchu, who works for the anti-virus firm Symantec, have found is that it targets the industrial infrastructure that underlies our everyday lives. They have also found that the country worst affected is Iran, which by last week had reported around three in every five infections worldwide.

It has not taken long for the implications to be spelt out. Ralf Langner, a German analyst with detailed knowledge of Siemens systems, had this to say on his personal blog: “Can we think of any reasonable target that would match the scenario? Yes, we can. Look at the Iranian nuclear programme. Strange – they are presently having some technical difficulties down there in Bushehr.”

Bushehr is a nuclear power station which has been built by Russia for Iran and which, within a fortnight of Mr Langner’s posting, confirmed that its opening had been delayed by two months, to January. Mr Langner even found a photograph taken inside the plant showing a computer screen – configured, he said, to run a Siemens operating system affected by Stuxnet and, moreover, configured wrongly so that it was vulnerable to bugs.

Iran has subsequently confirmed that computers run by Bushehr scientists have been infected, though it insists the plant itself is undamaged.

Another German analyst, Frank Rieger, went further. Bushehr is disliked by Iran’s enemies, but not nearly as much as its separate uranium enrichment programme, which the West believes is part of a nuclear weapons programme. Since last year, mystery has surrounded its main facility at a place called Natanz, where the number of working centrifuges, the main enrichment devices, suddenly fell by 15 per cent – at the very time Stuxnet is first thought to have hit Iran.

As analysts reverse-engineering the code commented to Mr Rieger: “This is what nation states build, if their only other option would be to go to war.”

Israeli officials, governed by security laws, rarely reveal military secrets but are skilled at alluding to them in veiled ways. In July last year, Mr Rieger noted, a few days before Natanz’s problems were leaked, a retired member of the Israeli security cabinet and a veteran of Shin Bet, the Israeli secret service, briefed the Reuters news agency on what an Israeli cyber-warfare attack might look like.

Following a security drill that had revealed how a hacker could explode an Israeli fuel depot, the Shin Bet veteran said, cyber-warfare teams set about developing technologies that could employ this knowledge.

The briefing made clear that they had succeeded. “In retrospect, the piece sounds like an indirect announcement of a covert victory to allies and enemies,” Mr Rieger said.

In the past week, attention has focused on O Murchu’s discovery of a trace of a keyword in Stuxnet’s instructions: Myrtus. Myrtus, or Myrtle, in Hebrew becomes Hadassah, and Hadassah was the birth-name of Esther, the Jewish biblical heroine married to a king of Persia. Esther discovered that a courtier was plotting the murder of all of Persia’s Jews, and persuaded her husband to allow them to rise up pre-emptively to slaughter their assailants.

Could this be a further clue as to Stuxnet’s origins? It is already thought that defective parts have been deliberately fed into Natanz through imports of “dual-use” technologies slipped past the international sanctions imposed on Iran.

“This is a technology war that has gravitated into a cyber attack,” says Theodore Karasik, research director at the Institute of Near East and Gulf Military Analysis. “It’s not new but it’s getting more ferocious.”

Some analysts poo-poo the theory. One commentator points out that Myrtus could simply stand for My Remote Terminal Units.

A blog on the website of Forbes magazine refers to the diplomatic struggle between China and India. In July a glitch on a satellite used by most of India’s satellite television stations blacked them out, forcing operators to turn to a Chinese competitor. The Indian space programme uses Siemens operating systems.

We may never know for sure. The odd thing is that Stuxnet, so far, hasn’t actually been proved to have done anything. Stuxnet contains a “switch” believed to target one very specific, tailored Siemens system – but no one knows which one, or what the switch is intended to do.

Stuxnet “master controllers” have been traced to computer servers in Malaysia and Denmark, and the two security certificates that allowed the worm to infect systems were stolen from Taiwan. Thereafter the trail goes cold.

Israel has little to gain from denying or confirming anything. It cannot own up to what some see as a monumental act of irresponsibility – the creation of a worm that could attack any sensitive system anywhere in the world. On the other hand, its struggle with Iran is also psychological, and it does it no harm to be thought capable of disarming a nuclear programme without launching a missile.

Truth is the first casualty of war, but in a real war, the battlefield can only be obscured for so long. In Second World War prisoner-of-war camps, inmates traced on hand-drawn maps the overwhelming victories claimed by Japanese radio broadcasts and watched gleefully how
the “victories” took place ever closer to the Japanese mainland.

In cold wars, the process of deduction runs in an opposite direction. Spy agencies reveal the failures – the defecting Philbys – and only when they become more insignificant do we know victory is approaching.

Who knows the names of the spies who triumphed? Iran will never admit, and Israel may never say, if it was Stuxnet that damaged Natanz. There is one further hint, though. When Stuxnet does triumph, it leaves a number imprinted on its new host: 19790509. That number, Mr O Murchu says, seems to be a date – May 9, 1979.

Many things could have happened on May 9, 1979: it may just be someone’s birthday. But newspaper archives also tell us it was the day Habib Elghanian died. Who was Mr Elghanian? He was the first Iranian Jew to be hanged for spying by the new Islamic Republic. And as we all know, revenge is a dish best served cold.

Israel’s Stuxnet Victory !

October 4, 2010

On a par with the Six Day War, The Boats of Cherbourg, The Rescue at Entebbe, and The Osirak Reactor; Israel once again makes history defending itself and the Western World.

“A light Unto the Nations…” Isaiah 42:6

Vodpod videos no longer available.

YouTube – Israel’s Stuxnet Victory !, posted with vodpod

The Stuxnet Worm: Cyber Terror Game Changer?

October 4, 2010

Vodpod videos no longer available.

The Stuxnet Worm: Cyber Terror Game Changer? , posted with vodpod

Al Jazeera – Inside Story – A new frontier in cyber war?

October 4, 2010

Vodpod videos no longer available.

Inside Story – A new frontier in cyber war?, posted with vodpod

Hal Lindsey On The ” STUXNET ” Computer Worm

October 4, 2010

Vodpod videos no longer available.

Hal Lindsey On The ” STUXNET ” Computer Worm, posted with vodpod

Stuxnet Virus: Hackers Unleash New Cyber Weapon Video – Skynews

October 4, 2010

Vodpod videos no longer available.

Stuxnet Virus: Hackers Unleash New Cyber Weapon…, posted with vodpod

Stuxnet worm: Private security experts want US to tell them more – CSMonitor.com

October 4, 2010

Stuxnet worm: Private security experts want US to tell them more – CSMonitor.com.

By Mark Clayton, Staff writer / October 3, 2010

America’s government security experts are among the best in the world. But their private sector counterparts are mystified why government’s public findings on the Stuxnet worm – the world’s first publicly-known cyber superweapon – so often have seemed muted, old news, or incomplete.

Tucked away on a government website, the Industrial Control System-Cyber Emergency Response Team (ICS-CERT) – part of the Department of Homeland Security – posts alerts and bulletins with government analysis of Stuxnet, dutifully logging its findings since it emerged publicly in July.

Yet those government alerts have mostly been echoes of findings already made public by anti-virus companies and private researchers – often lagging by several days and providing less detailed findings, industrial control system security experts say.

It looks like government is either inept at releasing detailed technical information to help protect the country or – for other reasons political or strategic – has decided to pull its punches on helping defuse Stuxnet, security experts, former government officials and Stuxnet experts told the monitor.

For instance, they say, the US government so far has refused to provide details on Stuxnet that might help some 40-50 US-based industrial control systems possibly infected by this new generation of cyber-war software. The government’s failure, they say, leaves US corporations infected and open to attack in the future.

“Name me one new or helpful piece of information that ICS-CERT provided to the community on Stuxnet? Or any other helpful contribution on the biggest control system security event to date,” writes Dale Peterson, CEO of Digital Bond, a control systems security firm, in his Sept. 20 blog. “It seems to me to have been a delayed clipping service.”

‘Those bulletins they put out were missing key data’

“They had the expertise, the relationship with vendors, the equipment in their labs and the ability to analyze Stuxnet,” Mr. Peterson said in an interview. “But those bulletins they put out were missing key data or late. Getting this information out quickly was their sole mission, and they failed.”

Sean McGurk, director of DHS’s Control System Security Program, who oversees ICS-CERT, disputes that view, saying the team has been very focused on putting out timely public alerts – leaving out details if they did not serve the function of protecting critical US infrastructure systems.

“We took a broad all-hazards approach to the [Stuxnet] malcode,” he says in an interview. “We immediately began to analyze it and produce information to get into the hands of the community so they could begin taking protective measures.”

At the company level, ICS-CERT is focused on forensic incident response – like dealing with Stuxnet – and vulnerability assessment. Computer engineers in Washington, along with experts at the Department of Energy’s Idaho National Laboratory, test control system software and equipment. Results are distributed to software vendors and users of the system software.

“We were able to reverse engineer the [Stuxnet] code and monitor how it works,” McGurk says. “There have been individuals speculating on attribution and intent…. Our main focus has been on understanding the malware and putting mitigation in place – how to prevent the spread and how to protect the physical infrastructure.”

Still, examples of government as follower abound that Peterson and others say show the government has not been doing enough to get critical information out.

On Sept. 21, German researcher Ralph Langner dropped a bombshell at a cyber security conference in Maryland detailing how Stuxnet “fingerprints” its target, making it the first-known targeted cyber missile. It is designed to home in on and “destroy something” in the real world, Mr. Langner says. Some of his findings, posted on his website Sept. 13, were echoed days later in an ICS-CERT alert.

This past week the big anti-virus software company Symantec again eclipsed government researchers by unveiling a 49-page blue print of Stuxnet, which some experts speculate was aimed at wrecking Iranian nuclear facilities, but which has spread far beyond Iran.

Symantec’s analysis – much of it released long ago in blog posts this summer – details not only how Stuxnet operates, but also key steps to defuse it.

That could be important since Symantec notes in its new report that about 60 percent of the 100,000 Stuxnet-infected computers worldwide were in Iran. Yet just under 1 percent of those infections were in the US – roughly 900 computers systems. And within that smaller group, about 5 percent of the infections (40-50 computers) were on Siemens industrial control systems.

Siemans uncertain how many clients infected

That’s a lot more than Siemens admits to. A spokesman told the Monitor just 15 of its industrial controls systems clients worldwide had reported Stuxnet infection. The spokesman acknowledged, however, the company is not certain all its clients would have reported an infection if they had one.

That worries some experts who wish there was a stronger government push to fan out among potentially affected industries to explain Stuxnet and the threat variants it might pose.

“I don’t think the chemical industry has their eyes on this, which is why I’m writing about this,” says Patrick Coyle, a retired chemical engineer who writes a blog called Chemical Facility Security News. “Government hasn’t reached these guys.”

Others like Joel Langill, an industrial control systems security expert who works in the oil and gas industry says there’s been a distinct lack of information flowing from government.

“It was very quiet in July, and about the only place to get public information on Stuxnet was from Symantec,” says “I don’t think ICS-CERT reports have done justice to the magnitude of what happened. Their reports have contained a lot of detail about the Stuxnet worm and prevention, but haven’t done much about what to do if you had it. If this was a massive cyber attack, they didn’t do very well.”

On Sept. 29, ICS-CERT released a four-page “advisory,” the most recent in a series of similarly brief tracts on how Stuxnet has operated since July.

But until the Sept. 15 advisory – which appeared two days after Mr. Langner’s revelations on his website – none of these federal missives provided details that would be needed by US-based industrial systems to detect and remove Stuxnet from infected programmable logic controllers or PLCs, several experts say.

One part of Stuxnet sneaks into an industrial control system. But another part drops its main bomb on PLCs – vital computers that directly control robots on the factory floor. It was an issue focused on and unpacked in detail by Symantec in early August. But it took the government until its Sept. 15 advisory to address the PLC issue.

While some private researchers have peeled the Stuxnet onion, others left waiting since mid-July for key details from US government researchers for corroboration have frequently been disappointed.

“They did okay addressing Stuxnet, but I would like to know what I can do to prevent a similar attack coming in the future. That’s where they come up short,” says Langill.

One who applauds the federal government for its efforts on Stuxnet is Mark Weatherford, chief of security for the North American Electric Reliability Corporation. His organization, which is charged with keep the grid up and running, says his group has been working closely with government to get the word about Stuxnet security concerns directly to about 2,000 registered energy generators nationwide.

“Hopefully Stuxnet will die a peaceful death,” he says. “But we’re going to stay on top of it until we feel comfortable that the threat is no longer there.”

Lack of details leads to rumors and speculation

Still, the consistent shortfall in Stuxnet details from government has led to rumors and speculation. One theory circulating is that the Defense Department feared somehow exposing nuclear systems by detailing Stuxnet fixes.

Another more obvious theory is that Israel may be behind the cyber attack on Iran – and US officials don’t want to provide Iran with a road map for fixing computers inside their nuclear facilities. Iranian authorities have admitted that Stuxnet infiltrated their nuclear power plant.

“The real question is: Did the US government know the target,” says one cyber security expert in the private sector who asked not to be named because he works with the government sector and fears losing its business. “Did the US government know Stuxnet’s target and say, ‘No, no, no – we don’t want this information [about how to defang Stuxnet] out there. It’s highly plausible that people knew Iran was the target and didn’t want all the details about how to fix Stuxnet to get out right away.”

But Scott Borg, who directs the US Cyber Consequences Unit, an independent cyber research center, says because malware attacks are so hard to source, he would not be too quick to assume the US is withholding information to help Israel, or even that Iran was the target, despite the apparent predominance of Stuxnet infections reported in Iran.

The most plausible explanation is that private sector researchers are winning the race on getting information out because they are better at it.

“Most experts [on control systems] are in the private sector and sometimes they are just faster,” Mr. Borg says. “Everyone in government has to follow proper procedure. In the private sector you go for the right answer, cut every corner to get their first. It’s easier to do this work in very informal settings.”

Others, however, told the Monitor there is every sign that US government researchers at the Idaho National Laboratory knew a lot more about Stuxnet and how to defeat it – far more than has yet been released by the government. Government researchers, they say, knew well before most information about it was released publicly by private companies.

Government might have decided to release less information publicly about Stuxnet, Borg said, and supply it instead to Siemens with the details needed to fix the problem with its own customers, thereby safeguarding a valued relationship.

“There’s this decision making process,” he said. “Do we hurt trusted relationships, other governments, vendors, our own military? This is why you get this disparity between what is released from government and what’s released privately.”

Still, such decisions can leave even professionals “incredibly frustrated because they ended up looking like goofballs,” a former senior government official, who asked not to be named because he still works with government, says of US researchers on Stuxnet. “They had done good work. They knew a lot – and had gotten to a good place with [Stuxnet] before anybody else. But in public they looked like they weren’t on top of their game. These guys did an incredible level of work that never got out in enough technical detail.”

Meanwhile, back in Germany, Mr. Langner posted another blog item – this one an eight-point critique of what he writes is critical, but missing information not raised in the most recent Sept. 29 ICS-CERT advisory on Stuxnet.

“Why explain in great length all the funny files that Stuxnet installs and not saying how to simply pull the plug by deleting one file?” he writes.

Joe Weiss, a managing partner at Applied Control Solutions, which sponsored the conference where Langner spoke, is disappointed that government officials at the conference provided few details about Stuxnet.

‘Why are they holding back?’

“Neither the Department of Energy or DHS has been giving us any real help on this issue,” says Mr. Weiss. “If they’ve got the information, why the heck wasn’t that information being sent to our infrastructure owners? Why are they holding back?

He and others say there is more than a little irony in federal officials touting last week’s Cyber Storm III, the government’s third big war game, as great preparation for a cyber attack with the backdrop of Stuxnet, the first known cyber superweapon to make its appearance in the public realm.

But to charges of offering late and incomplete information on this major new threat, DHS’s Mr. McGurk says his agency has no apologies for not listing all the gory details, which he said is intentional when it occurs.

“I wouldn’t say information was intentionally withheld because it wasn’t complete,” he says referring to the ICS-CERT alerts on Stuxnet since July. Sometimes it’s best to go to work directly with the chemical industry or petroleum industry, he notes.

That may entail sharing some detailed information the government knows but wants to keep to itself and those who most need to know it – information, he says, that is “not something we are going to put publicly on a public website.”