Thursday, May 13, 2021

Cyber Terror

 

Cyber Terror

 The recent ransomed shutdown of the Colonial Pipeline, presumably by private Russian hackers, no longer at all afraid of our weak government, raises several points.  The most important is how easy it is for hackers to break into and ransom our infrastructure.  Ransomware is old technology, that has been around for ages.  The fact that these guys applied ransomware to a major American pipeline, dos not bode well for other crucial systems that we rely upon.

 The simple fact is that anyone who knows their way around the computer and network world, and has some knowledge of network security, could probably have accessed the modules controlling the pipeline.  These modules are either little network devices, with IP addresses themselves, or controlled by offline computers, where destructive code would need to be loaded by an external device, like a flash drive.

 All of the major powers, including our NSA, have cyberweapons groups that are actively developing cyberweapons to disable enemy infrastructure.  The Chinese, Russians and other communist or ex-communist countries are particularly active and adept in this field.

 There are also independent hacker groups all over the world, whose aim is to hold individuals, companies or countries hostage for money, like this incident with Colonial Pipeline.

 This reminds me of Stuxnet, which found and ruined multiple centrifuges in Iran in 2010 onward.  This was an extremely sophisticated cyberattack, which not only found a particular model of logic controller in Iran, Stuxnet masked itself and imperceptibly sped up uranium centrifuges, and burned out over 1,000 of them. 

 Trump, as a pragmatic, no nonsense, businessman, would probably ensure that our infrastructure is properly strengthened.  Biden and his bureaucratic clowns?  Not so much.

 This is my write-up of Stuxnet dated two years ago.  Stuxnet code is now available to anyone.  With capabilities such as these, is there any wonder that our infrastructure is in danger?

  

Stuxnet and Ramifications

 I just finished reading “Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon” by Kim Zetter, about the Stuxnet cyber worm and variants, that succeeded in setting back the Iranian nuclear program by several years.

 Stuxnet is a malicious computer worm, first uncovered in 2010, that targets SCADA systems and is believed to be responsible for causing substantial damage to Iran's nuclear program. Although neither country has openly admitted responsibility, the worm is believed to be a jointly built American/Israeli cyberweapon.

 Stuxnet specifically targets programmable logic controllers (PLCs), which allow the automation of electromechanical processes such as those used to control machinery and industrial processes including centrifuges for separating nuclear material. Stuxnet functions by targeting machines using the Microsoft Windows operating system and networks, then seeking out Siemens Step7 software. Stuxnet reportedly compromised Iranian PLCs, collecting information on industrial systems and causing the fast-spinning centrifuges to either tear themselves apart, or spin irregularly and fail sooner than normal. Stuxnet Has really opened up a can of worms (sic), since it could be tailored as a platform for attacking any modern supervisory control and data acquisition (SCADA) and PLC systems (e.g., in factory assembly lines or power plants), the majority of which reside in Europe, Japan and the US.

 Stuxnet reportedly ruined almost one fifth of Iran's nuclear centrifuges. Targeting industrial control systems, the worm infected over 200,000 computers and caused 1,000 machines to physically degrade.

 Stuxnet has three modules: a worm that executes all routines related to the main payload of the attack; a link file that automatically executes the propagated copies of the worm; and a rootkit component responsible for hiding all malicious files and processes, preventing detection of the presence of Stuxnet. Versions of Stuxnet incorporated up to four or five “zero day” exploits and several stolen, digitally signed certificates for device drivers, both unheard of in the normal “hacktivist” world.  It is typically introduced to the target environment via an infected USB flash drive, thereby crossing any air gap. The worm then propagates across the local or wider network, scanning for Siemens Step7 software on computers controlling a PLC. In the absence of either criterion, Stuxnet becomes dormant inside the computer. If both the conditions are fulfilled, Stuxnet introduces the infected rootkit onto the PLC and Step7 software, modifying the code and giving unexpected commands to the PLC while returning a loop of normal operations system values feedback to the users.

 Kim Zetter’s book traces the discovery of a version of Stuxnet in an Iranian personal computer by Sergey Ulasen, of VirusBlokAda a small security company in Belarus, to unpacking and reverse engineering Stuxnet and variants by the Symantec and Kaspersky security groups over a number of years.  She also discusses the ramifications of what amounts to a cyber-attack by one nation-state against another, and the fact that this technology is now available in the wild for possible further use.


Ray Gruszecki
May 8, 2019 & May 12, 2021

No comments:

Post a Comment