SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Your computer is not
handled by you.
You have loss your
data.
You do not know what
your computer do.
Presentation By :
Atif Hasnain Zaidi
 Basically Stuxnet is a Computer
worm.
 It is discovered in June 2010.
 It is believed that STUXNET created
by the United States and Israel to
attack Iran's nuclear facilities.
 Roel Schouwenberg spends his days
(and many nights) to creating the
STUXNET.
 A 500-kilobyte computer worm that
infected the software of at least 14
industrial sites in Iran, including a
uranium-enrichment plant.
 A computer virus relies on an
unwitting victim to install it,
a worm spreads on its own, often
over a computer network.
 This worm was an unprecedentedly
masterful and malicious piece of
code that attacked in three phases.
 2009 June: Earliest Stuxnet seen
◦ Does not use MS10-046
◦ Does not have signed drivers
 2010 Jan: Stuxnet driver signed
◦ With a valid certificate belonging to Realtek
Semiconductors
 2010 June: Virusblokada reports W32.Stuxnet
◦ Stuxnet use MS10-46
◦ Verisign revokes Realtek certificate
 2010 July: Eset identify new Stuxnet driver
◦ With a valid certificate belonging to JMicron
Technology Corp
 2010 July: Siemens report they are investigating
malware SCADA systems
◦ Verisign revokes JMicron certificate
 2010 Aug: Microsoft issues MS10-046
◦ Patches windows shell shortcut vulnerability
 2010 Sept: Microsoft issues MS10-061
◦ Patches Printer Spooler Vulnerability
 2010 Sept: Iran nuclear plant hit by delay
◦ Warm weather blamed
◦ Measured temperatures were at historical averages
 2010 Oct: Iran arrest “spies”
◦ Spies who attempted to sabotage the country's
nuclear programme
◦ Russian nuclear nuclear experts flee Iran
 Organization
◦ Stuxnet consists of a large .dll file
◦ 32 Exports (Function goals)
◦ 15 Resources (Function methods)
 Stuxnet calls LoadLibrary
◦ With a specially crafted file name that does not
exist
◦ Which causes LoadLibrary to fail.
 However, W32.Stuxnet has hooked Ntdll.dll
◦ To monitor for requests to load specially crafted
file names.
◦ These specially crafted filenames are mapped to
another location instead
◦ A location specified by W32.Stuxnet.
◦ Where a .dll file has been decrypted and stored
by the Stuxnet previously.
 Stuxnet collects and store the following information:
◦ Major OS Version and Minor OS Version
◦ Flags used by Stuxnet
◦ Flag specifying if the computer is part of a
workgroup or domain
◦ Time of infection
◦ IP address of the compromised computer
◦ file name of infected project file
 Win 2K
 WinXP
 Windows 200
 Vista
 Windows Server 2008
 Windows 7
 Windows Server 2008 R2
 Iran
◦ Iran blames Stuxnet worm on Western plot (Ministry
of Foreign Affairs)
◦ "Western states are trying to stop Iran's (nuclear)
activities by embarking on psychological warfare
and aggrandizing, but Iran would by no means give
up its rights by such measures,“
◦ "Nothing would cause a delay in Iran's nuclear
activities“
◦ "enemy spy services" were responsible for Stuxnet
(Minister of intelligence)
 Israel (DEBKA file)
◦ An alarmed Iran asks for outside help to stop
rampaging Stuxnet malworm
◦ Not only have their own attempts to defeat the
invading worm failed, but they made matters
worse:
 The malworm became more aggressive and returned to
the attack on parts of the systems damaged in the
initial attack.
◦ One expert said: "The Iranians have been forced
to realize that they would be better off not
'irritating' the invader because it hits back with a
bigger punch.“
◦ These statements were copied verbatim by mayor
 India 8.31%
 Azerbaijan 2.57%
 United States 1.56%
 Pakistan 1.28%
 Others 9.2%
 Iran 60%
 Indonesia 18.22%
 Stuxnet represents the first of many milestones in
malicious code history
◦ It is the first to exploit multiple 0-day
vulnerabilities,
◦ Compromise two digital certificates,
◦ And inject code into industrial control systems
◦ and hide the code from the operator.
 Stuxnet is of such great complexity
◦ Requiring significant resources to develop
◦ That few attackers will be capable of producing a
similar threat
 Stuxnet has highlighted direct-attack attempts on
critical infrastructure are possible and not just
theory or movie plotlines.
Stuxnet
Stuxnet

Weitere ähnliche Inhalte

Was ist angesagt?

The stuxnet computer worm. harbinger of an emerging warfare capability
The stuxnet computer worm. harbinger of an emerging warfare capabilityThe stuxnet computer worm. harbinger of an emerging warfare capability
The stuxnet computer worm. harbinger of an emerging warfare capabilityYury Chemerkin
 
Stuxnet update 15_feb2011
Stuxnet update 15_feb2011Stuxnet update 15_feb2011
Stuxnet update 15_feb2011AngelaHoltby
 
Cyber security regulation strictly regulated by nrc feb 2013
Cyber security regulation strictly regulated by nrc feb 2013Cyber security regulation strictly regulated by nrc feb 2013
Cyber security regulation strictly regulated by nrc feb 2013Yury Chemerkin
 
Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Rahman_Hussain
 
Post Apocalyptic Cyber Realism
Post Apocalyptic Cyber RealismPost Apocalyptic Cyber Realism
Post Apocalyptic Cyber RealismRichard Stiennon
 
Malware freak show
Malware freak showMalware freak show
Malware freak showsr1nu
 
NULL Mumbai NewsBytes
NULL Mumbai NewsBytesNULL Mumbai NewsBytes
NULL Mumbai NewsBytesVirajThakkar4
 
Free Libre Open Source Software Development
Free Libre Open Source Software DevelopmentFree Libre Open Source Software Development
Free Libre Open Source Software DevelopmentFrederik Questier
 
Leone ct#2 presentation rev
Leone ct#2 presentation revLeone ct#2 presentation rev
Leone ct#2 presentation revvincentleone
 
2011-A_Novel_Approach_to_Troubleshoot_Security_Attacks_in_Local_Area_Networks...
2011-A_Novel_Approach_to_Troubleshoot_Security_Attacks_in_Local_Area_Networks...2011-A_Novel_Approach_to_Troubleshoot_Security_Attacks_in_Local_Area_Networks...
2011-A_Novel_Approach_to_Troubleshoot_Security_Attacks_in_Local_Area_Networks...Mrunalini Koritala
 
勒索軟體態勢與應措
勒索軟體態勢與應措勒索軟體態勢與應措
勒索軟體態勢與應措jack51706
 
Review on Honeypot Security
Review on Honeypot SecurityReview on Honeypot Security
Review on Honeypot SecurityIRJET Journal
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and crackingHarshil Barot
 
Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]Mikko Hypponen
 
Introduction to Malware Detection and Reverse Engineering
Introduction to Malware Detection and Reverse EngineeringIntroduction to Malware Detection and Reverse Engineering
Introduction to Malware Detection and Reverse Engineeringintertelinvestigations
 

Was ist angesagt? (20)

The stuxnet computer worm. harbinger of an emerging warfare capability
The stuxnet computer worm. harbinger of an emerging warfare capabilityThe stuxnet computer worm. harbinger of an emerging warfare capability
The stuxnet computer worm. harbinger of an emerging warfare capability
 
Stuxnet update 15_feb2011
Stuxnet update 15_feb2011Stuxnet update 15_feb2011
Stuxnet update 15_feb2011
 
Cyber security regulation strictly regulated by nrc feb 2013
Cyber security regulation strictly regulated by nrc feb 2013Cyber security regulation strictly regulated by nrc feb 2013
Cyber security regulation strictly regulated by nrc feb 2013
 
Malware
MalwareMalware
Malware
 
Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Securing The Computer From Viruses ...
Securing The Computer From Viruses ...
 
Post Apocalyptic Cyber Realism
Post Apocalyptic Cyber RealismPost Apocalyptic Cyber Realism
Post Apocalyptic Cyber Realism
 
Malware freak show
Malware freak showMalware freak show
Malware freak show
 
News bytes null 200314121904
News bytes null 200314121904News bytes null 200314121904
News bytes null 200314121904
 
NULL Mumbai NewsBytes
NULL Mumbai NewsBytesNULL Mumbai NewsBytes
NULL Mumbai NewsBytes
 
Computer virus 2
Computer virus 2Computer virus 2
Computer virus 2
 
Free Libre Open Source Software Development
Free Libre Open Source Software DevelopmentFree Libre Open Source Software Development
Free Libre Open Source Software Development
 
Leone ct#2 presentation rev
Leone ct#2 presentation revLeone ct#2 presentation rev
Leone ct#2 presentation rev
 
2011-A_Novel_Approach_to_Troubleshoot_Security_Attacks_in_Local_Area_Networks...
2011-A_Novel_Approach_to_Troubleshoot_Security_Attacks_in_Local_Area_Networks...2011-A_Novel_Approach_to_Troubleshoot_Security_Attacks_in_Local_Area_Networks...
2011-A_Novel_Approach_to_Troubleshoot_Security_Attacks_in_Local_Area_Networks...
 
勒索軟體態勢與應措
勒索軟體態勢與應措勒索軟體態勢與應措
勒索軟體態勢與應措
 
Review on Honeypot Security
Review on Honeypot SecurityReview on Honeypot Security
Review on Honeypot Security
 
I Heart Stuxnet
I Heart StuxnetI Heart Stuxnet
I Heart Stuxnet
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
 
Honeypot a trap to hackers
Honeypot a trap to hackersHoneypot a trap to hackers
Honeypot a trap to hackers
 
Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]
 
Introduction to Malware Detection and Reverse Engineering
Introduction to Malware Detection and Reverse EngineeringIntroduction to Malware Detection and Reverse Engineering
Introduction to Malware Detection and Reverse Engineering
 

Andere mochten auch

The story of story
The story of storyThe story of story
The story of storysean8668
 
My city my story
My city my storyMy city my story
My city my storysean8668
 
My MAS application
My MAS applicationMy MAS application
My MAS applicationmeganhanney
 
Hemlock grove Communications strategy
Hemlock grove Communications strategyHemlock grove Communications strategy
Hemlock grove Communications strategymeganhanney
 
Mikels journal articlereview
Mikels journal articlereviewMikels journal articlereview
Mikels journal articlereviewsean8668
 

Andere mochten auch (6)

The story of story
The story of storyThe story of story
The story of story
 
Visita a la biblioteca
Visita a la bibliotecaVisita a la biblioteca
Visita a la biblioteca
 
My city my story
My city my storyMy city my story
My city my story
 
My MAS application
My MAS applicationMy MAS application
My MAS application
 
Hemlock grove Communications strategy
Hemlock grove Communications strategyHemlock grove Communications strategy
Hemlock grove Communications strategy
 
Mikels journal articlereview
Mikels journal articlereviewMikels journal articlereview
Mikels journal articlereview
 

Ähnlich wie Stuxnet

Stuxnet mass weopan of cyber attack
Stuxnet mass weopan of cyber attackStuxnet mass weopan of cyber attack
Stuxnet mass weopan of cyber attackAjinkya Nikam
 
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...Cybersecurity Education and Research Centre
 
News letter aug 11
News letter aug 11News letter aug 11
News letter aug 11captsbtyagi
 
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...Lior Rotkovitch
 
(120715) #fitalk the era of cyber sabotage and warfare (case study - stuxnet)
(120715) #fitalk   the era of cyber sabotage and warfare (case study - stuxnet)(120715) #fitalk   the era of cyber sabotage and warfare (case study - stuxnet)
(120715) #fitalk the era of cyber sabotage and warfare (case study - stuxnet)INSIGHT FORENSIC
 
Mag-Securs No.29, 2011 - Validy: Learning from the Stuxnet Case
Mag-Securs No.29, 2011 - Validy: Learning from the Stuxnet CaseMag-Securs No.29, 2011 - Validy: Learning from the Stuxnet Case
Mag-Securs No.29, 2011 - Validy: Learning from the Stuxnet CaseNeelabh Rai
 
Stuxnet - A weapon of the future
Stuxnet - A weapon of the futureStuxnet - A weapon of the future
Stuxnet - A weapon of the futureHardeep Bhurji
 
CYBER ATTACKS ON GEORGIAN GOVERNMENTAL RESOURCES - Zurab Akhvlediani
CYBER ATTACKS ON GEORGIAN GOVERNMENTAL RESOURCES - Zurab AkhvledianiCYBER ATTACKS ON GEORGIAN GOVERNMENTAL RESOURCES - Zurab Akhvlediani
CYBER ATTACKS ON GEORGIAN GOVERNMENTAL RESOURCES - Zurab AkhvledianiDataExchangeAgency
 
Cybersecurity and-cyberwar-singer-en-22186
Cybersecurity and-cyberwar-singer-en-22186Cybersecurity and-cyberwar-singer-en-22186
Cybersecurity and-cyberwar-singer-en-22186Avirot Mitamura
 
Detecting and Confronting Flash Attacks from IoT Botnets
Detecting and Confronting Flash Attacks from IoT BotnetsDetecting and Confronting Flash Attacks from IoT Botnets
Detecting and Confronting Flash Attacks from IoT BotnetsFarjad Noor
 
Port security
Port securityPort security
Port securityborepatch
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesPierluigi Paganini
 
Read the NIST documents that I provided and Chapter 12 in your text..docx
Read the NIST documents that I provided and Chapter 12 in your text..docxRead the NIST documents that I provided and Chapter 12 in your text..docx
Read the NIST documents that I provided and Chapter 12 in your text..docxangelicar11
 
Topic #17 IT Security ITSecurityIncidentsA.docx
Topic #17   IT Security ITSecurityIncidentsA.docxTopic #17   IT Security ITSecurityIncidentsA.docx
Topic #17 IT Security ITSecurityIncidentsA.docxjuliennehar
 
Mobile application security
Mobile application securityMobile application security
Mobile application securityEY Belgium
 

Ähnlich wie Stuxnet (20)

Cyber
CyberCyber
Cyber
 
Stuxnet mass weopan of cyber attack
Stuxnet mass weopan of cyber attackStuxnet mass weopan of cyber attack
Stuxnet mass weopan of cyber attack
 
SIC_gr5.pptx
SIC_gr5.pptxSIC_gr5.pptx
SIC_gr5.pptx
 
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
 
News letter aug 11
News letter aug 11News letter aug 11
News letter aug 11
 
Cyber-what?
Cyber-what?Cyber-what?
Cyber-what?
 
603535ransomware
603535ransomware603535ransomware
603535ransomware
 
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
 
(120715) #fitalk the era of cyber sabotage and warfare (case study - stuxnet)
(120715) #fitalk   the era of cyber sabotage and warfare (case study - stuxnet)(120715) #fitalk   the era of cyber sabotage and warfare (case study - stuxnet)
(120715) #fitalk the era of cyber sabotage and warfare (case study - stuxnet)
 
Mag-Securs No.29, 2011 - Validy: Learning from the Stuxnet Case
Mag-Securs No.29, 2011 - Validy: Learning from the Stuxnet CaseMag-Securs No.29, 2011 - Validy: Learning from the Stuxnet Case
Mag-Securs No.29, 2011 - Validy: Learning from the Stuxnet Case
 
Stuxnet - A weapon of the future
Stuxnet - A weapon of the futureStuxnet - A weapon of the future
Stuxnet - A weapon of the future
 
Malware Freak Show
Malware Freak ShowMalware Freak Show
Malware Freak Show
 
CYBER ATTACKS ON GEORGIAN GOVERNMENTAL RESOURCES - Zurab Akhvlediani
CYBER ATTACKS ON GEORGIAN GOVERNMENTAL RESOURCES - Zurab AkhvledianiCYBER ATTACKS ON GEORGIAN GOVERNMENTAL RESOURCES - Zurab Akhvlediani
CYBER ATTACKS ON GEORGIAN GOVERNMENTAL RESOURCES - Zurab Akhvlediani
 
Cybersecurity and-cyberwar-singer-en-22186
Cybersecurity and-cyberwar-singer-en-22186Cybersecurity and-cyberwar-singer-en-22186
Cybersecurity and-cyberwar-singer-en-22186
 
Detecting and Confronting Flash Attacks from IoT Botnets
Detecting and Confronting Flash Attacks from IoT BotnetsDetecting and Confronting Flash Attacks from IoT Botnets
Detecting and Confronting Flash Attacks from IoT Botnets
 
Port security
Port securityPort security
Port security
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
 
Read the NIST documents that I provided and Chapter 12 in your text..docx
Read the NIST documents that I provided and Chapter 12 in your text..docxRead the NIST documents that I provided and Chapter 12 in your text..docx
Read the NIST documents that I provided and Chapter 12 in your text..docx
 
Topic #17 IT Security ITSecurityIncidentsA.docx
Topic #17   IT Security ITSecurityIncidentsA.docxTopic #17   IT Security ITSecurityIncidentsA.docx
Topic #17 IT Security ITSecurityIncidentsA.docx
 
Mobile application security
Mobile application securityMobile application security
Mobile application security
 

Kürzlich hochgeladen

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 

Kürzlich hochgeladen (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

Stuxnet

  • 1.
  • 2. Your computer is not handled by you. You have loss your data. You do not know what your computer do.
  • 3. Presentation By : Atif Hasnain Zaidi
  • 4.  Basically Stuxnet is a Computer worm.  It is discovered in June 2010.  It is believed that STUXNET created by the United States and Israel to attack Iran's nuclear facilities.  Roel Schouwenberg spends his days (and many nights) to creating the STUXNET.
  • 5.  A 500-kilobyte computer worm that infected the software of at least 14 industrial sites in Iran, including a uranium-enrichment plant.  A computer virus relies on an unwitting victim to install it, a worm spreads on its own, often over a computer network.  This worm was an unprecedentedly masterful and malicious piece of code that attacked in three phases.
  • 6.  2009 June: Earliest Stuxnet seen ◦ Does not use MS10-046 ◦ Does not have signed drivers  2010 Jan: Stuxnet driver signed ◦ With a valid certificate belonging to Realtek Semiconductors  2010 June: Virusblokada reports W32.Stuxnet ◦ Stuxnet use MS10-46 ◦ Verisign revokes Realtek certificate  2010 July: Eset identify new Stuxnet driver ◦ With a valid certificate belonging to JMicron Technology Corp  2010 July: Siemens report they are investigating malware SCADA systems ◦ Verisign revokes JMicron certificate
  • 7.  2010 Aug: Microsoft issues MS10-046 ◦ Patches windows shell shortcut vulnerability  2010 Sept: Microsoft issues MS10-061 ◦ Patches Printer Spooler Vulnerability  2010 Sept: Iran nuclear plant hit by delay ◦ Warm weather blamed ◦ Measured temperatures were at historical averages  2010 Oct: Iran arrest “spies” ◦ Spies who attempted to sabotage the country's nuclear programme ◦ Russian nuclear nuclear experts flee Iran
  • 8.  Organization ◦ Stuxnet consists of a large .dll file ◦ 32 Exports (Function goals) ◦ 15 Resources (Function methods)  Stuxnet calls LoadLibrary ◦ With a specially crafted file name that does not exist ◦ Which causes LoadLibrary to fail.  However, W32.Stuxnet has hooked Ntdll.dll ◦ To monitor for requests to load specially crafted file names. ◦ These specially crafted filenames are mapped to another location instead ◦ A location specified by W32.Stuxnet. ◦ Where a .dll file has been decrypted and stored by the Stuxnet previously.
  • 9.  Stuxnet collects and store the following information: ◦ Major OS Version and Minor OS Version ◦ Flags used by Stuxnet ◦ Flag specifying if the computer is part of a workgroup or domain ◦ Time of infection ◦ IP address of the compromised computer ◦ file name of infected project file  Win 2K  WinXP  Windows 200  Vista  Windows Server 2008  Windows 7  Windows Server 2008 R2
  • 10.
  • 11.  Iran ◦ Iran blames Stuxnet worm on Western plot (Ministry of Foreign Affairs) ◦ "Western states are trying to stop Iran's (nuclear) activities by embarking on psychological warfare and aggrandizing, but Iran would by no means give up its rights by such measures,“ ◦ "Nothing would cause a delay in Iran's nuclear activities“ ◦ "enemy spy services" were responsible for Stuxnet (Minister of intelligence)
  • 12.  Israel (DEBKA file) ◦ An alarmed Iran asks for outside help to stop rampaging Stuxnet malworm ◦ Not only have their own attempts to defeat the invading worm failed, but they made matters worse:  The malworm became more aggressive and returned to the attack on parts of the systems damaged in the initial attack. ◦ One expert said: "The Iranians have been forced to realize that they would be better off not 'irritating' the invader because it hits back with a bigger punch.“ ◦ These statements were copied verbatim by mayor
  • 13.  India 8.31%  Azerbaijan 2.57%  United States 1.56%  Pakistan 1.28%  Others 9.2%  Iran 60%  Indonesia 18.22%
  • 14.  Stuxnet represents the first of many milestones in malicious code history ◦ It is the first to exploit multiple 0-day vulnerabilities, ◦ Compromise two digital certificates, ◦ And inject code into industrial control systems ◦ and hide the code from the operator.  Stuxnet is of such great complexity ◦ Requiring significant resources to develop ◦ That few attackers will be capable of producing a similar threat  Stuxnet has highlighted direct-attack attempts on critical infrastructure are possible and not just theory or movie plotlines.