Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Does computer worm "stuxnet" attack Iranian Nuclear Program?
#3
From http://www.langner.com/en/index.htm

Stuxnet logbook, Sep 21 2010, 1200 hours MESZ


Ralph's analysis, part 2

Many aspects of Stuxnet are so completely different from malware as we know it that it's only natural that so many hard-working experts at some point in the analysis ended in frustration. The best way to approach Stuxnet is not to think of it as a piece of malware like Sasser or Zotob, but to think of it as part of an operation -- operation myrtus. Operation myrtus can be broken down into three major stages: Preparation, infiltration, and execution.

Stage 1, preparation:
- Assemble team, consisting of multiple units (intel, covert ops, exploit writers, process engineers, control system engineers, product specialists, military liaison)
- Assemble development & test lab, including process model
- Do intel on target specifics, including identification of key people for initial infiltration
- Steal digital certificates

Stage 2, infiltration:
- Initial infiltration using USB sticks, perhaps using contractor's comprised web presence
- Weapon spreads locally via USB stick sharing, shared folders, printer spoolers
- Contact to command & control servers for updates, and for evidence of compromise
- Update local peers by using embedded peer-to-peer networking
- shut down CC servers

Stage 3, execution:
- Check controller configuration
- Identify individual target controllers
- Load rogue ladder logic
- Hide rogue ladder logic from control system engineers
- Check PROCESS condition
- Activate attack sequence

What this shows is that the 0day exploits were only of temporary use during the infiltration stage. Quite a luxury for such sophisticated exploits! After the weapon was in place, the main attack is executed on the controllers. At that point, where the rogue ladder logic is executed, it's all solid, reliable engineering -- attack engineering.
The most relevant literature regarding what happened since September 11, 2001 is George Orwell's "1984".
Reply


Messages In This Thread
Does computer worm "stuxnet" attack Iranian Nuclear Program? - by Carsten Wiethoff - 22-09-2010, 03:45 PM
Does computer worm "stuxnet" attack Iranian Nuclear Program? - by Mark Stapleton - 27-09-2010, 07:22 AM
Does computer worm "stuxnet" attack Iranian Nuclear Program? - by Mark Stapleton - 27-09-2010, 11:56 PM
Does computer worm "stuxnet" attack Iranian Nuclear Program? - by Mark Stapleton - 29-09-2010, 04:05 AM

Possibly Related Threads…
Thread Author Replies Views Last Post
  Terror in Mali: An Attack on China and Russia? One Third of the Victims were Russians and Chinese Paul Rigby 3 10,517 09-01-2019, 10:59 AM
Last Post: Marius Titulescu
  Barcelona Terror Attack Anomalies David Guyatt 3 39,159 23-08-2017, 12:52 AM
Last Post: Lauren Johnson
  London attack a false flag Hei Sing Tso 4 9,803 28-03-2017, 01:53 AM
Last Post: Rolf Zaeschmar
  New York, New Jersey: Another US "Terrorist" Attack David Guyatt 5 7,555 24-10-2016, 07:20 AM
Last Post: Peter Lemkin
  Every Single Terrorist Attack in the US was a False Flag David Guyatt 5 12,614 24-05-2016, 06:46 AM
Last Post: Peter Lemkin
  TRIPLE TERROR ATTACK: What’s Behind the Events in France, Tunisia and Kuwait? R.K. Locke 0 3,371 29-06-2015, 10:00 PM
Last Post: R.K. Locke
  Police Murders: The Next Attack on the Social Fabric? Lauren Johnson 14 15,014 23-12-2014, 03:47 PM
Last Post: Magda Hassan
  Bomb Kills Iranian Nuclear Scientist Keith Millea 13 9,542 14-11-2014, 12:36 PM
Last Post: Magda Hassan
  Ottawa Under Armed Attack - Three Locations Including Parliament Peter Lemkin 5 4,707 23-10-2014, 02:47 PM
Last Post: Tracy Riddle
  Iran nuclear weapon testing document highly suspect David Guyatt 0 2,426 19-10-2014, 09:30 AM
Last Post: David Guyatt

Forum Jump:


Users browsing this thread: 1 Guest(s)