Preview

The Stuxnet Virus

Better Essays
Open Document
Open Document
1719 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The Stuxnet Virus
John Velarosa
Professor Ingram D. Rogers
1106CSIA3014041
August 3rd 2011
The Stuxnet Virus

The Stuxnet Virus
Abstract:
What diplomacy could not achieve, sanctions could not silent, and for which a military option was not viable, a cyber attack quietly accomplished.
Kim Zetter an investigative reporter with Wired Magazine online calls Stuxnet, “a piece of software that would ultimately make history as the world’s first real cyberweapon.” (Zetter, 2011, sec. 1)
In his article, Is “Stuxnet” the best malware ever? Gregg Keizer of Computer World says:
“The Stuxnet worm is a "groundbreaking" piece of malware so devious in its use of unpatched vulnerabilities, so sophisticated in its multipronged approach, that the security researchers who tore it apart believe it may be the work of state-backed professionals.” (Keizer, 2010)
Israel and the United States are widely considered to be behind the creation of the malicious Stuxnet worm which eventually sabotaged Iran's nuclear program. Systems that could have helped quickly build an Iranian nuclear bomb were effectively crippled by the malicious software. Stuxnet first came to light in July 2010 when nearly 60% of infections were being reported from Iran. While the United States and Israel did lead an aggressive international political campaign to get Iran to halt its nuclear program, neither country has openly admitted any involvement in this cyber attack. There is no hard evidence that links either country to Stuxnet. Regardless, most experts believe that this cyber attack was carried out by the two countries on Iranian computers that control centrifuges in key nuclear plants, and that it has set the country back at least a few years in its quest to build nuclear weapons.

1. Introduction:
In June 2010, Belarus-based security firm VirusBlokAda reported the first detection of a malicious malware named Stuxnet that attacks supervisory control and data acquisition (SCADA) systems running on Windows



Bibliography: 1. Zetter, K. (2011, July 11). How digital detectives deciphered Stuxnet, the most menacing malware in history. Wired.Com. Retrieved August 3rd 2011 from: http://www.wired.com/threatlevel/2011/07/how-digital-detectives-deciphered-stuxnet/all/1 2. Keizer, G. (2010, September 16). Is Stuxnet the 'best ' malware ever? Computerworld.Com. Retrieved August 3rd 2011 from: http://www.computerworld.com/s/article/9185919/Is_Stuxnet_the_best_malware_ever_ 3. Broad W. J., Markoff, J., & Sanger, D. E. (2011, January 15). Israeli test on worm called crucial in Iran nuclear delay. [Electronic version]. New York Times. Retrieved from: http://www.nytimes.com/2011/01/16/world/middleeast/16stuxnet.html?pagewanted=all 4. Masters, J. (2011, May 23). Confronting the cyber threat. Council on Foreign Relations Website. Retrieved August 3rd 2011, from: http://www.cfr.org/technology-and-foreign-policy/confronting-cyber-threat/p15577

You May Also Find These Documents Helpful

  • Best Essays

    INTL 440 Syllabus LDD Jan 14

    • 2263 Words
    • 11 Pages

    This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies.…

    • 2263 Words
    • 11 Pages
    Best Essays
  • Powerful Essays

    BUS 520 Case 1 1

    • 1885 Words
    • 6 Pages

    The computer virus employees of Symantec Corp. are never able to enjoy a finished product. They are constantly collecting viruses and suspicious codes to analyze the way they work and to find a solution to prevent these viruses form damaging the public’s computers. They are determined to provide their consumers with updated versions of anti-viruses for their computers. At the Symantec lab, they have a box, which has all dangerous types of viruses that needs or be disposed of. Vincent Weafer has been a part of Symantec since 1999. In 1999, there were only a few employees at Symantec and that there were only a few viruses spread out through months compared to how it is now. Nowadays there are about 20,000 viruses monthly spread out, so more talented employees around the world work for Symantec. Vincent Weafer said that colleges are not creating computer security experts everyday so as soon as they find someone who does, that no matter in what country they hire him or her. The Blaster-B worm made Symantec employees work really hard and this proved that they needed more employees would be more talented towards fixing these problems. Each employee has their own job; some people are managers who are responsible for responding to new security threats, some write research papers, some develop tools that will be used to fight the viruses and even some who find out about the new viruses. Symantec never stops meaning that the labs switch when they are done for the day. Vincent Weafer wants to have a well-defined process for dealing with the viruses that are found every day.…

    • 1885 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Dr. Strangelove and Cat’s Cradle both have similarities in their story line. They were written in the 1960’s by different authors, (Dr. Strangelove is a movie not a novel) and both mentioned and dealt with Communists, and involved scientists. Although they have their similarities, the common topics are of weapons of mass destruction, power, and a dark comedy.…

    • 466 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Ralph Langner’s article on the Stuxnet worm discusses the hardware, distribution and targets of the attack. He also goes into detail regarding the outlook of future attacks and what we can do to prevent them.…

    • 958 Words
    • 3 Pages
    Good Essays
  • Better Essays

    A cyber-attack is a deliberate exploitation of computer systems, technology-dependent enterprises, and networks (Janssen, n.d.). There are 11 potential security threats thought to be the top security threats for 2013; targeted attacks and cyber-espionage, hacktivism, nation-state-sponsored cyber-attacks, legal surveillance tools, clouds and malware, privacy threats, fake security certificates, ransomeware spreading globally, MAC OS malware, mobile malware, and vulnerabilities and exploits (Davis, 2013). Symantec’s 2013 Internet Security Threat report finds that there was a 42% increase in targeted attacks in 2012…

    • 1317 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    This article discusses Homeland Security's decision to renew Raytheon's contract as its cyber protector. In September Raytheon was picked as the main contractor for the Network Security Deployment division. This new contract is directly influenced by the companies new plans to prioritize cyber security as just last year the Office of Personnel Management was hacked, leaving data on 21.5 million people comprised. Moreover, in January of this year, a report on Homeland's cyber security admitted to limitations in ability to detect possible malware. Overall, cyber security is a controversial issue. An example of this is the debate surrounding the unlocking of a terrorist's iPhone in December, which Apple refused to do.…

    • 111 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Spyware

    • 2042 Words
    • 9 Pages

    References: Hinde, Stephen. "Spyware: The Spy In The Computer." Computer Fraud & Security 2004.12 (2004): 15-16. Academic Search Premier. Web. 15 June 2013.…

    • 2042 Words
    • 9 Pages
    Better Essays
  • Better Essays

    Bibliography: U.S. Department of Homeland Security. (n.d.). Cyber-Security. Retrieved from Department of Homeland Security: http://www.dhs.gov/cybersecurity…

    • 1965 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Mrs Deveane Atkinson

    • 1262 Words
    • 6 Pages

    References: Lloyd, H., & Craig, S. (2007). A guide to taking a patient 's history... Clinical skills: 28. Nursing Standard, 22(13), 42-48.…

    • 1262 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Perlroth, N. (2012, October 23). In Cyberattack on Saudi Firm, U.S. Sees Iran Firing Back. New York Times, http://www.nytimes.com/2012/10/24/business/global/cyberattack-on-saudi-oil-firm-disquiets-us.html?pagewanted=all&_r=0…

    • 2002 Words
    • 9 Pages
    Better Essays
  • Satisfactory Essays

    2. Which of the available conflict management strategies is most appropriate for the current situation with Clyde and Dan? Provide your rationale, including what factors you considered in making your selection. Your response should be at least 100 words.…

    • 535 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Bendelladj Research Paper

    • 614 Words
    • 3 Pages

    Latterly, while scrolling through my Facebook newsfeed, I stumbled across a very interesting photo – shared by one of my friends. It claimed that Hamza Bendelladj, a 27-year-old, Algerian hacker had been sentenced to death by a US judge after allegedly co-creating a banking Trojan horse known as “SpyEye”. The Trojan has reportedly infected more than 1.4 million computers across the globe. It was used to steal millions of dollars from more than 200 American banks and financial institutions after obtaining sensitive information from computer systems, which the hacker had then apparently, donated to several Palestinian charities.…

    • 614 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Greengard, Samuel. “Spies Among Us?” Association for Computing Machinery. Communications of the ACM [New York], vol. 53, no.4, 2010. Print.…

    • 2182 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    Vernon, M. (2004, April). Top five threats. Retrieved July 23, 2014, from Computer Weekly: http://www.computerweekly.com/feature/Top-five-threats…

    • 1430 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    “The main reason for this controversy is that cyber-threats have not materialized as a national security threat, even granted that there have been some few incidents with at least some potential for grave consequences. Interestingly enough, both hypers and de-hypers tend to agree on this point. But while the first group assumes that vicious attacks that wreak havoc and paralyze whole nations are imminent, more cautious researchers often point to the practical difficulties of a serious cyberattack (Ingles-le Nobel,…

    • 677 Words
    • 3 Pages
    Satisfactory Essays