Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Security Worms

First Victims of the Stuxnet Worm Revealed 39

An anonymous reader writes: Analyzing more than 2,000 Stuxnet files collected over a two-year period, Kaspersky Lab can identify the first victims of the Stuxnet worm. Initially security researchers had no doubt that the whole attack had a targeted nature. The code of the Stuxnet worm looked professional and exclusive; there was evidence that extremely expensive zero-day vulnerabilities were used. However, it wasn't yet known what kind of organizations were attacked first and how the malware ultimately made it right through to the uranium enrichment centrifuges in the particular top secret facilities. Kaspersky Lab analysis sheds light on these questions.
This discussion has been archived. No new comments can be posted.

First Victims of the Stuxnet Worm Revealed

Comments Filter:
  • by halivar ( 535827 ) <bfelger&gmail,com> on Tuesday November 11, 2014 @05:44PM (#48363857)

    You can always count on Bob to open any email he sees that has "Miley Cyrus" in the subject line. Had to clean out is system three times this month. Damn you, Bob. This is all your fault.

  • Why is it surprising that itneventually co-opted uranium enrichment facilities? Wasn't it developed for such a purpose?
  • Save the suspense (Score:5, Informative)

    by jbmartin6 ( 1232050 ) on Tuesday November 11, 2014 @06:02PM (#48364031)
    Why is the summary being coy about the first thing anyone will ask upon reading it? That is pointless. Here:

    It took us a long time to establish what organization it really was, but ultimately we succeeded in identifying it with a high degree of certainty. It is called Foolad Technic Engineering Co (FIECO). It is an Iranian company with headquarters in Isfahan. The company creates automated systems for Iranian industrial facilities (mostly those producing steel and power) and has over 300 employees. The company is directly involved with industrial control systems.

    • by Anonymous Coward

      Thanks. It seemed clearly clickbait. Now that you extracted the relevant part, I don't have to give them the click-through.

    • by n3r0.m4dski11z ( 447312 ) on Tuesday November 11, 2014 @06:47PM (#48364377) Homepage Journal

      Maybe if you RTFA you would notice that it is a bit more complicated than that. The organization or individual who went after the centrifuges infected at least 5 different companies. An electric company, a steel manufacturer, 2 different industrial supply companies and a military importer /exporter company. These targets were all brand new infections, not passed from org to org. So they would have had to break security at at least 5 firms independently. Not too shabby.

      You should read the second link, because it is quite fascinating. Who ever did it exploited the servers directly (as opposed to laptop vectors or smart phones or whathave you), and even went so far in two of the companies as first infecting the virus scan servers (one machine named kaspersky, another avserver...). Must have been awfully ballsy and confident about their viruses stealth.

      So we have learned that it was a directed attack, over multiple targets, the initial infection was most likely delivered by network access and not by USB.

      I think your summary misses most of the interesting parts. The name of the one company with hardly any context would not have added to the slashdot summary at all and would most likely make people miss out on nice simple deconstruction which the second link provides.

      • Like you, I found the investigation to be interesting. I have read a lot previously on this infection and the virus itself since it was very unique (kernel can load and unload modules on the fly, polymorphic and encrypted traffic), etc.. This just make it even more interesting in my opinion.

      • With a clickbait summary like this, I actively avoided RTFA.
  • I think i lost interest in anything this article says when I read " extremely expensive zero-day vulnerabilities".

  • by BoRegardless ( 721219 ) on Tuesday November 11, 2014 @06:14PM (#48364095)

    There are those who are spies and paid well to do their work.

  • A well-done hack (Score:4, Insightful)

    by sirwired ( 27582 ) on Tuesday November 11, 2014 @06:32PM (#48364259)

    No matter which "side" you are on, you have to admire how well it worked; doing exactly what it was designed to for quite a while before being discovered. I'd put it on a level with the legendary DirectTV "Black Sunday" program.

    • @sirwired: 'No matter which "side" you are on, you have to admire how well it worked; doing exactly what it was designed to for quite a while before being discovered. I'd put it on a level with the legendary DirectTV "Black Sunday" program.'

      Yes, all it required was a USB socket and Windows :)

"Here's something to think about: How come you never see a headline like `Psychic Wins Lottery.'" -- Comedian Jay Leno

Working...