Dismiss Notice
You are browsing this site as a guest. It takes 2 minutes to CREATE AN ACCOUNT and less than 1 minute to LOGIN

Virus hatari

Discussion in 'Tech, Gadgets & Science Forum' started by TECHMAN, Jun 21, 2011.


    TECHMAN JF-Expert Member

    Jun 21, 2011
    Joined: May 20, 2011
    Messages: 2,675
    Likes Received: 124
    Trophy Points: 160
    0 Comment
    [FONT=verdana !important]

    is the first Microsoft Windows computer worm made entirely out of code discovered in July 2010 that can be used as a weapon in industrial software and equipment.

    Below is a video produced for Australian TV program HungryBeast on Australia's ABC1, with an infographic dissecting the nature and ramifications of Stuxnet.

    Stuxnet: Anatomy of a Computer Virus on Vimeo[/TD]

    To read more about Stuxnet visit this particular page on Reuters and eWeek

    source: Stuxnet: A computer worm engineered to destroy industries. The case of Iran's nuclear progam setback - Wavuti

    TECHMAN JF-Expert Member

    Jun 21, 2011
    Joined: May 20, 2011
    Messages: 2,675
    Likes Received: 124
    Trophy Points: 160
    (Reuters) - A computer virus that attacks a widely used industrial system appears aimed mostly at Iranand its sophistication suggests a state may have been involved in creating it, Western cyber security companies said on Friday.
    "Stuxnet is a working and fearsome prototype of a cyber-weapon that will lead to the creation of a new arms race in the world," Kaspersky Labs said in a statement.
    Here are some details on Stuxnet:
    * The virus is malicious software, or malware, that attacks widely used industrial control systems built by German firm Siemens. Experts say the virus could be used for espionage or sabotage.
    * Siemens says the malware spreads via infected USB thumb drive memory devices, exploiting a vulnerability in Microsoft Corp's Windows operating system that has now been resolved.
    * The malware attacks software programs that run Supervisory Control and Data Acquisition, or SCADA, systems. Such systems are used to monitor automated plants -- from food and chemical facilities to power generators.
    * Analysts said attackers may have chosen to spread the malicious software via a thumb drive because many SCADA systems are not connected to the Internet, but do have USB ports.
    * Once the worm infects a system, it quickly sets up communications with a remote server computer that can be used to steal proprietary corporate data or take control of the SCADA system, said Randy Abrams, a researcher with ESET, a privately held security firm that has studied Stuxnet.
    * Siemens, Microsoft and security experts who have studied the worm have yet to determine who devised it.
    * Mikka Hypponen, chief research officer at Finnish security software firm F-Secure, says he believes it was a state sponsored attack. Stuxnet is highly complex and "obviously done by a group with serious technological and financial backing."
    * Ralph Langner, a German cyber expert, says the attack was by highly qualified experts, probably a nation state. "This is not some hacker sitting in the basement of his parents' house." On his website, www.langner.com/en/index.htm, Langner said investigations would eventually "point" to the attackers. "The attackers must know this. My conclusion is, they don't care. They don't fear going to jail."
    * A study of the spread of Stuxnet by U.S. technology company Symnatec showed that the main affected countries as of August 6 were -- Iran, with 62,867 infected computers, Indonesia with 13,336, India 6,552, United States 2,913, Australia 2,436, Britain 1,038, Malaysia 1,013 and Pakistan with 993.
    * Belarussian firm Virusblokada was the first to identify the virus in mid-June. Commercial director Gennady Reznikov told Reuters the company has a dealer in Iran, and one of the dealer's clients had computers infected with a virus that turned out to be Stuxnet. Reznikov said Virusblokada itself had no connection to the nuclear power plant at Bushehr.
    * According to Siemens spokesman Michael Krampe, Siemens has identified 15 customers that found Stuxnet on their systems, and "each was able to detect and remove the virus without any impact to their operations."