Tuesday, November 22, 2011

Stuxnet Strike on U.S. Utility Signals Disturbing Trend

U.S. security Relevant Products/Services experts say a variant of the Stuxnet computer Relevant Products/Services worm caused the destruction of a water pump at a public utility in Springfield, Ill., last week. Discovered in June of last year, Stuxnet targets the Windows Relevant Products/Services-based supervisory control Relevant Products/Services and data Relevant Products/Services acquisition (SCADA) systems developed by Siemens to control and monitor specific industrial processes.

Though the destruction of a pump might not seem like such a big deal, there are oil pipelines, power plants, large communication Relevant Products/Services systems, airports, ships and even military installations around the world using similar control systems. An earlier cyber attack targeting a control system at a hydroelectric facility in Russia killed more than 70 people in 2009.

The potential threats posed by cyber warfare are only outranked by nuclear bombs and other weapons of mass destruction, warned Gen. Keith Alexander, the commander of U.S. Cyber Command and director of the National Security Agency.

"When you look at the vulnerabilities that we face in this area, it's extraordinary," Alexander said earlier this month. "What we see is a disturbing trend -- from exploitation to disruption to destruction."

A New Cyber Arms Race

What's worse, Stuxnet may merely be the prototype for more powerful next-generation cyber weapons that ultimately will make the Web the new battleground in an ever-widening arms race.

"In the past there were just cyber criminals," said Kaspersky Lab CEO Eugene Kaspersky. "Now I am afraid it is the time of cyber terrorism, cyber weapons and cyber wars," he warned the security industry in a speech delivered in November of last year.

The first known Stuxnet variants uncovered were specifically aimed at Iran-based organizations with probable ties to the nation's nuclear energy program. The sophistication of the worm's coding and other factors have led computer security experts to believe that Stuxnet was a state-sponsored worm specifically constructed for conducting cyber warfare.

"This piece of malware was designed to sabotage plants, to damage industrial systems," Kaspersky said.

Protective Measures

Last week the worm turned, and this time the target was an industrial installation in the United States. According to Applied Control Systems cyber security expert Joseph Weiss, it appears that the attack on the Illinois water utility had actually been under way for weeks prior to the pump's destruction.

"Minor glitches were observed in remote Relevant Products/Services access Relevant Products/Services to the SCADA system for two to three months before it was identified as a cyber attack," Weiss wrote in a blog. "It is believed the SCADA software Relevant Products/Services vendor was hacked and customer Relevant Products/Services usernames and passwords stolen."

To protect U.S. military installations, the U.S. Defense Department is evaluating a possible move to more-secure Relevant Products/Services cloud Relevant Products/Services computing environments, which would prevent foreign adversaries from targeting any single computer server.

As part of a more dynamic perimeter defense network Relevant Products/Services, Alexander is also considering the creation of special "hunter teams" that could actively seek out and defuse potential cyber threats before they actually cause damage.

Artikel yang Berkaitan

0 komentar:

Post a Comment