SlideShare ist ein Scribd-Unternehmen logo
1 von 2
•
Stuxnet Cometh: Defence Agencies Prepare
for Next Generation Warfare
The emergence of the 'Stuxnet Worm', a Windows-based malware programme designed to
upset and reprogramme large-scale industrial computer systems, has been described by
experts as the first recognised 'cyber weapon'.
Where most cases of malware attacks have been motivated by financial reward or general
disruption, Stuxnet has been clearly designed to target critical infrastructure. The worm
operates through external Programmable Logic Controllers (PLCs) and can pass to
computers not connected to the internet via transportable plug-in data drives.
The programme rose to public attention in September when word of infected Iranian
industrial plants hit the mainstream headlines. Since then, similar systems in Russia and
Kazakhstan have suffered significant problems with the worm.
While studies have indicated a drop in Stuxnet incidents worldwide in the past few weeks,
huge cause for concern persists. There is suggestion that the programme is able to burrow
deep into a system, appearing to have vanished when actually still present. Aside to this,
the nature of the worm's mode of transport raises a question of whether it can be
effectively contained on a global level.
The worm reportedly targets the WinCC application employed by Siemens SIMATIC Series
7 PLC line, leading some to suspect a Siemens insider as the rogue developer. However,
most cyber analysts agree that the culprit is likely a team of specialist developers with in-
depth knowledge of the targeted systems, with most suggestions pointing to a nation state
effort behind its creation.
Confidence has been expressed that the originator will soon be exposed. Considering the
chaos-inducing blow was dealt to Russian and certain South Asian systems, it is unlikely
that these regions sourced the malware. Incidents in the US and Germany have also been
reported.
Accusations have been made from the obvious to the intriguing: a Western or Israeli
military operation designed to disable the Iranian nuclear capability; or a Chinese effort to
disable India's INSAT-4B satellite so as to take a lead in their space race rivalry, to name
just two theories.
Until the attack on Iranian infrastructure was broadcast, experts widely understood the
concept of cyber warfare to have been an eventuality rather than a reality. This event now
places us in a new era in which cyber warfare is no longer theoretical and action and
discussion is vital to ensure the protection of critical infrastructure on a global scale.
Eugene Kaspersky, founder of internet security giant Kaspersky Lab, addressed the
situation at a conference in Munich, stating: "I am afraid this is the beginning of a new
world. The 90's were a decade of cyber vandals, the 2000's were a decade of cyber
criminals. I am afraid now it is a new era of cyber wars and cyber terrorism."
The cyber security community is abuzz with insight and speculation on Stuxnet. Several
notable aspects of the worm's uniqueness has been highlighted from efforts to decrypt its
personality, including the fact that it leaves large parts of code behind - which could be
transported by others unknowingly - to the discovery that it includes a fingerprint
technology designed to target a specific system in a specific location at a specific time, and
checks every 5 seconds as to whether parameters have been met to launch a disruptive
attack.
For more information visit www.defenciq.com
For more information, please contact:
Natalie Evans
Online Marketing Manager,
Defence IQ
Tel: +44 (0) 207 368 9338
Email Natalieevans@defenceiq.com

Weitere ähnliche Inhalte

Mehr von Sharmin Ahammad

Forward Operating Bases 2012
Forward Operating Bases 2012Forward Operating Bases 2012
Forward Operating Bases 2012Sharmin Ahammad
 
Submarine Operations & Requirements
Submarine Operations & RequirementsSubmarine Operations & Requirements
Submarine Operations & RequirementsSharmin Ahammad
 
Directed Energy Systems 2012
Directed Energy Systems 2012Directed Energy Systems 2012
Directed Energy Systems 2012Sharmin Ahammad
 
Airborne Early Warning and Battle Management
Airborne Early Warning and Battle ManagementAirborne Early Warning and Battle Management
Airborne Early Warning and Battle ManagementSharmin Ahammad
 
Cyber Warfare Europe 2011
Cyber Warfare Europe 2011Cyber Warfare Europe 2011
Cyber Warfare Europe 2011Sharmin Ahammad
 
Defence Logistics Europe 2011
Defence Logistics Europe 2011Defence Logistics Europe 2011
Defence Logistics Europe 2011Sharmin Ahammad
 
Future Artillery 2011 Conference Brochure
Future Artillery 2011 Conference BrochureFuture Artillery 2011 Conference Brochure
Future Artillery 2011 Conference BrochureSharmin Ahammad
 
Defence IQ Events Calendar 2011
Defence IQ Events Calendar 2011Defence IQ Events Calendar 2011
Defence IQ Events Calendar 2011Sharmin Ahammad
 
Infantry Weapons Sector Report 2010
Infantry Weapons Sector Report 2010Infantry Weapons Sector Report 2010
Infantry Weapons Sector Report 2010Sharmin Ahammad
 

Mehr von Sharmin Ahammad (11)

Forward Operating Bases 2012
Forward Operating Bases 2012Forward Operating Bases 2012
Forward Operating Bases 2012
 
Submarine Operations & Requirements
Submarine Operations & RequirementsSubmarine Operations & Requirements
Submarine Operations & Requirements
 
Directed Energy Systems 2012
Directed Energy Systems 2012Directed Energy Systems 2012
Directed Energy Systems 2012
 
Airborne Early Warning and Battle Management
Airborne Early Warning and Battle ManagementAirborne Early Warning and Battle Management
Airborne Early Warning and Battle Management
 
Cyber Warfare Europe 2011
Cyber Warfare Europe 2011Cyber Warfare Europe 2011
Cyber Warfare Europe 2011
 
Defence Logistics Europe 2011
Defence Logistics Europe 2011Defence Logistics Europe 2011
Defence Logistics Europe 2011
 
CBRN Resilience 2011
CBRN Resilience 2011CBRN Resilience 2011
CBRN Resilience 2011
 
Future Artillery 2011 Conference Brochure
Future Artillery 2011 Conference BrochureFuture Artillery 2011 Conference Brochure
Future Artillery 2011 Conference Brochure
 
Defence Logistics UAE
Defence Logistics UAEDefence Logistics UAE
Defence Logistics UAE
 
Defence IQ Events Calendar 2011
Defence IQ Events Calendar 2011Defence IQ Events Calendar 2011
Defence IQ Events Calendar 2011
 
Infantry Weapons Sector Report 2010
Infantry Weapons Sector Report 2010Infantry Weapons Sector Report 2010
Infantry Weapons Sector Report 2010
 

Kürzlich hochgeladen

ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesShubhangi Sonawane
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 

Kürzlich hochgeladen (20)

ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 

Stuxnet cometh defence agencies prepare next generation warfare

  • 1. • Stuxnet Cometh: Defence Agencies Prepare for Next Generation Warfare The emergence of the 'Stuxnet Worm', a Windows-based malware programme designed to upset and reprogramme large-scale industrial computer systems, has been described by experts as the first recognised 'cyber weapon'. Where most cases of malware attacks have been motivated by financial reward or general disruption, Stuxnet has been clearly designed to target critical infrastructure. The worm operates through external Programmable Logic Controllers (PLCs) and can pass to computers not connected to the internet via transportable plug-in data drives. The programme rose to public attention in September when word of infected Iranian industrial plants hit the mainstream headlines. Since then, similar systems in Russia and Kazakhstan have suffered significant problems with the worm. While studies have indicated a drop in Stuxnet incidents worldwide in the past few weeks, huge cause for concern persists. There is suggestion that the programme is able to burrow deep into a system, appearing to have vanished when actually still present. Aside to this, the nature of the worm's mode of transport raises a question of whether it can be effectively contained on a global level. The worm reportedly targets the WinCC application employed by Siemens SIMATIC Series 7 PLC line, leading some to suspect a Siemens insider as the rogue developer. However, most cyber analysts agree that the culprit is likely a team of specialist developers with in- depth knowledge of the targeted systems, with most suggestions pointing to a nation state effort behind its creation. Confidence has been expressed that the originator will soon be exposed. Considering the chaos-inducing blow was dealt to Russian and certain South Asian systems, it is unlikely that these regions sourced the malware. Incidents in the US and Germany have also been reported. Accusations have been made from the obvious to the intriguing: a Western or Israeli military operation designed to disable the Iranian nuclear capability; or a Chinese effort to disable India's INSAT-4B satellite so as to take a lead in their space race rivalry, to name just two theories. Until the attack on Iranian infrastructure was broadcast, experts widely understood the concept of cyber warfare to have been an eventuality rather than a reality. This event now places us in a new era in which cyber warfare is no longer theoretical and action and discussion is vital to ensure the protection of critical infrastructure on a global scale. Eugene Kaspersky, founder of internet security giant Kaspersky Lab, addressed the situation at a conference in Munich, stating: "I am afraid this is the beginning of a new world. The 90's were a decade of cyber vandals, the 2000's were a decade of cyber criminals. I am afraid now it is a new era of cyber wars and cyber terrorism." The cyber security community is abuzz with insight and speculation on Stuxnet. Several notable aspects of the worm's uniqueness has been highlighted from efforts to decrypt its personality, including the fact that it leaves large parts of code behind - which could be
  • 2. transported by others unknowingly - to the discovery that it includes a fingerprint technology designed to target a specific system in a specific location at a specific time, and checks every 5 seconds as to whether parameters have been met to launch a disruptive attack. For more information visit www.defenciq.com For more information, please contact: Natalie Evans Online Marketing Manager, Defence IQ Tel: +44 (0) 207 368 9338 Email Natalieevans@defenceiq.com