Results 1 to 20 of 55

Thread: Stuxnet: Target Bushehr?

Hybrid View

Previous Post Previous Post   Next Post Next Post
  1. #1
    Council Member
    Join Date
    Sep 2007
    Location
    UK
    Posts
    203

    Default

    Re. Stuxnet

    Firstly take the reports in the press with a bucket load of salt, particularly Langner’s wild speculations in post 14.

    If you are interested in this malware read Symantec’s report (64 page .pdf ) which outlines the function of all code modules, propagation methods and variations in great detail.

    What is clear (see graphs around page 6) and from the infection method is that the intended target was in Iran. The intended end result is the speeding up, and slowing down, of some industrial motors. It is very specific in the criteria needed for activation the report outlines the nitty gritty on page 42

    To more clearly illustrate the behavior of the injected code, we’ve outlined the key events that would occur with an infected 315-2 CPU connected to multiple CP 342-5 modules each with 31 frequency converter drive slaves, as shown in the diagram below.
    The PLC is infected.•
    Frequency converter slaves • send records to their CP-342-5 master, building a frame of 31 records The CPU records the CP-342-5 addresses.
    The frames are examined and the fields are recorded.•
    After approximately 13 days, enough events have been recorded, showing the system has been operating • between 807 Hz and 1210 Hz.
    The infected PLC generates and sends sequence 1 to its frequency converter drives, setting the frequency to • 1410Hz.
    Normal operation resumes.•
    After approximately 27 days, enough events have been recorded.•
    The infected PLC generates and sends sequence 2 to its frequency converter drives, setting the frequency • initially to 2Hz and then 1064Hz.
    Normal operation resumes.•
    After approximately 27 days, enough events have been recorded.•
    The infected PLC generates and sends sequence 1 to its frequency converter drives, setting the frequency to • 1410Hz.
    Normal operation resumes.•
    After approximately 27 days, enough events have been recorded.•
    The infected PLC generates and sends sequence 2 to its frequency converter drives, setting the frequency • initially to 2Hz and then 1064Hz.#
    What is going on here is the authors – of the malware - are only interested in motors running at between 807 & 1210Hz they could instruct the motor to spin at very high speed in reverse and cause immediate catastrophic damage but what they do is introduce a cycle that waits a couple of week then increases the revs to 1410Hz (not wildly above the normal range) then returns to normal operation for weeks before almost stopping the motor (2Hz) then setting it to 1064Hz (inside the normal range) before restarting the cycle. What effect this would have obviously depends on what the motors are driving and this control equipment is so generic the Siemens site has a sales .pdf with case studies of various companies using their system controlling sewing machines and motors moving packages off a conveyor belt and onto a palette. The very specific criteria and precise speed changes imply a detailed knowledge of the target and imply an attempt not to cause collateral damage.

    The extreme complexity of the code, the use of 3 Windows zero day exploits (these are like gold dust they are previously undocumented security weakness each of which would normally be the basis of a new virus, to ‘waste’ 3 in one attack is unheard of) and one in the Siemens Step 7 control software. This is man years of work and probably needed someone to gain access to the premises of both Realtek & JMicron (both in Tiawan)
    “The attackers would have needed to obtain the digital certificates from someone who may have physically entered the premises of the two companies and stole them, …”
    I do not know where in Iran the target was but the report shows that Iran alone had 60,000 infected computers in 30,000 organisations at one point with nearly 70% running the Step 7 control software. The complexity, specificity, absence of pecuniary advantage, and attempts not to damage systems, other than the target, does point to a Nation State. The fact that Iran was the epicentre of the attack does make one wonder if its nuclear facilities were the intended target but I have seen no reports that state that Natanz or Bushehr use the S7-315 CPU which is the very specific target.

    Now if anyone here can tell me authoritatively that the Natanz centrifuges spin speeds are controlled by 6ES7 315-2 (it is that specific) processors then …
    Last edited by JJackson; 12-08-2010 at 05:36 PM.

  2. #2
    Council Member AdamG's Avatar
    Join Date
    Dec 2005
    Location
    Hiding from the Dreaded Burrito Gang
    Posts
    3,096

    Default

    (Newser) – Iran is waging war on open Internet. Looking to limit the cyber-infiltration of Western ideas, Iran's telecommunications chief claimed that, in two years time, all Iranians would be forced to use a state-censored, fully-internal Internet. About 60% of the nation's homes and businesses are expected to be on it much sooner than that, he added. Iran sees the move toward heightened online policing as a way to uphold Islamic moral values, though whether it can truly block the world's Internet remains an open question, the Wall Street Journal reports.
    http://www.newser.com/story/119645/i...m_campaign=pop
    A scrimmage in a Border Station
    A canter down some dark defile
    Two thousand pounds of education
    Drops to a ten-rupee jezail


    http://i.imgur.com/IPT1uLH.jpg

  3. #3
    Council Member davidbfpo's Avatar
    Join Date
    Mar 2006
    Location
    UK
    Posts
    13,366

    Default Stuxnet made simple

    Thanks to 'Doctrine Man' pointing to this Australian, three minute animated explanation:http://vimeo.com/25118844

    Good question or warning at the end.
    davidbfpo

  4. #4
    Council Member AdamG's Avatar
    Join Date
    Dec 2005
    Location
    Hiding from the Dreaded Burrito Gang
    Posts
    3,096

    Default

    Langner says as they dug deeper into the Stuxnet code, each new discovery left them more impressed and wondering what was coming next. He says he couldn't imagine who could have created the worm, and the level of expertise seemed almost alien. But that would be science fiction, and Stuxnet was a reality.

    "Thinking about it for another minute, if it's not aliens, it's got to be the United States," he says.
    http://www.npr.org/2011/09/26/140789...tuxnet?ps=cprs
    A scrimmage in a Border Station
    A canter down some dark defile
    Two thousand pounds of education
    Drops to a ten-rupee jezail


    http://i.imgur.com/IPT1uLH.jpg

  5. #5
    Council Member AdamG's Avatar
    Join Date
    Dec 2005
    Location
    Hiding from the Dreaded Burrito Gang
    Posts
    3,096

    Default

    A newly discovered piece of malicious code dubbed Duqu is closely related to the notorious Stuxnet worm that damaged Iran's nuclear-enrichment centrifuges last year. Although it has no known target or author, it sets the stage for more industrial and cyberwar attacks, experts say.

    "This is definitely a troubling development on a number of levels," says Ronald Deibert, director of Citizen Lab, an Internet think-tank at the University of Toronto who leads research on cyberwarfare, censorship, and espionage. "In the context of the militarization of cyberspace, policymakers around the world should be concerned."
    http://www.technologyreview.com/comp...55/?p1=MstRcnt
    A scrimmage in a Border Station
    A canter down some dark defile
    Two thousand pounds of education
    Drops to a ten-rupee jezail


    http://i.imgur.com/IPT1uLH.jpg

  6. #6
    Council Member
    Join Date
    Aug 2010
    Posts
    98

    Default

    They found the loader, updates here:
    http://www.symantec.com/connect/w32-...ro-day-exploit

    It didn't get less interesting.

Similar Threads

  1. Snipers Sniping & Countering them
    By DDilegge in forum Trigger Puller
    Replies: 226
    Last Post: 04-30-2019, 08:59 AM
  2. The Roles and Weapons with the Squad
    By Faceman in forum Trigger Puller
    Replies: 977
    Last Post: 05-25-2014, 01:49 AM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •