The most complicated piece of malicious software ever built? … Cyber Mega-Weapon?…Technical Block Buster?…Super worm?… “Best Malware Eva”?…
It’s all of these…..and more!
Here’s the facts:
- Attacks began somewhere between July 2009 and January 2010
- Discovered in June 2010
- It’s roughly 50 times the size of a typical computer virus -almost 0.5 MB
- Suspected to be State sponsored
- Exploits 4 zero-day Windows vulnerabilities
- Targets large scale industrial control systems
- Specifically targeted Iran – 60% of infected PCs were in Iran
- Used at least two stolen digital certificates
- Written in multiple languages
- Included a counter that limited spread to 3 PCs
- Wasn’t after information – it wanted control of the machinery
The complication, sophistication and target of the virus mean it was probably State sponsored and the State was probably the United States… A diplomatic cable obtained by WikiLeaks showed how the United States was advised to target Iran’s nuclear capabilities through ‘covert sabotage’.
“All the different circumstances, from the multiple zero-days to stolen certificates to its distribution, the most plausible scenario is a nation-state-backed group.” Schouwenberg
The video below excellently describes this crazy worm:
You can View or Download Bits of Stuxnet if you want and take a look…although there’s plenty of more interesting things to do if you’re bored…
The History of Cyber Warfare
From governments to major corporations, cyber attacks are growing rapidly in scope and frequency across the globe. These attacks may soon be considered an “act of war” so having the latest information security training is becoming increasingly important. To be prepared for the future, you must also learn from the past.