Critical infrastructureStuxnet, world's first "cyber superweapon," attacks China

Published 1 October 2010

Stuxnet, the most sophisticated malware ever designed, could make factory boilers explode, destroy gas pipelines, or even cause a nuclear plant to malfunction; experts suspect it was designed by Israeli intelligence programmers to disrupt the operations of Iran’s nuclear facilities — especially that country’s centrifuge farms and the nuclear reactor in Bushehr; it has now infected Chinese industrial control systems as well; one security expert says: “The Stuxnet worm is a wake-up call to governments around the world—- It is the first known worm to target industrial control systems”

Stuxnet finds another victim // Source: itp.net

 

Stuxnet is feared by experts around the globe as it can break into computers that control machinery at the heart of industry, allowing an attacker to assume control of critical systems like pumps, motors, alarms, and valves.

AFP reports that it could, technically, make factory boilers explode, destroy gas pipelines, or even cause a nuclear plant to malfunction.

The virus targets control systems made by German industrial giant Siemens commonly used to manage water supplies, oil rigs, power plants and other industrial facilities.

This malware is specially designed to sabotage plants and damage industrial systems, instead of stealing personal data,” an engineer surnamed Wang at antivirus service provider Rising International Software told the Global Times. “Once Stuxnet successfully penetrates factory computers in China, those industries may collapse, which would damage China’s national security,” he added.

Another unnamed expert at Rising International said the attacks had so far infected more than six million individual accounts and nearly 1,000 corporate accounts around the country, the official Xinhua news agency reported.

The Stuxnet computer worm — a piece of malicious software (malware) which copies itself and sends itself on to other computers in a network — was first publicly identified in June.

It was found lurking on Siemens systems in India, Indonesia, Pakistan and elsewhere, but the heaviest infiltration appears to be in Iran, according to software security researchers.

A Beijing-based spokesman for Siemens declined to comment when contacted by AFP on Thursday.

Yu Xiaoqiu, an analyst with the China Information Technology Security Evaluation Centre, downplayed the malware threat. “So far we don’t see any severe damage done by the virus,” Yu was quoted by the Global Times as saying.

New viruses are common nowadays. Both personal Internet surfers and Chinese pillar companies don’t need to worry about it at all. They should be alert but not too afraid of it.”

A top U.S. cybersecurity official said last week that the country was analyzing the computer worm but did not know who was behind it or its purpose. “One of our hardest jobs is attribution and intent,” Sean McGurk, director of the National Cybersecurity and Communications Integration Center (NCCIC), told reporters in Washington. “It’s very difficult to say ‘This is what it was targeted to do,’” he said of Stuxnet, which some computer security experts have said may be intended to sabotage a nuclear facility in Iran.

A cyber superweapon is a term used by experts to describe a piece of malware designed specifically to hit computer networks that run industrial plants. “The Stuxnet worm is a wake-up call to governments around the world,” Derek Reveron, a cyber expert at the U.S. Naval War School, was quoted as saying Thursday by the South China Morning Post. “It is the first known worm to target industrial control systems.”