Ergebnis 1 bis 2 von 2
  1. #1
    ٠•●• ॐ •●•٠ Avatar von meckl
    Registriert seit
    08.06.2007
    Beiträge
    749

    Standard Stuxnet Questions and Answers

    Stuxnet Questions and Answers

    Stuxnet continues to be a hot topic. Here are answers to some of the questions we've received.

    Q: What is Stuxnet?
    A: It's a Windows worm, spreading via USB sticks. Once inside an organization, it can also spread by copying itself to network shares if they have weak passwords.

    Q: Can it spread via other USB devices?
    A: Sure, it can spread anything that you can mount as a drive. Like a USB hard drive, mobile phone, picture frame and so on.

    Q: What does it do then?
    A: It infects the system, hides itself with a rootkit and sees if the infected computer is connected to Siemens Simatic (Step7) factory system.

    Q: What does it do with Simatic?
    A: It modifies commands sent from to the Windows computer to the PLC. One running on the PLC, it looks for a specific factory environment. If this is not found, it does nothing.

    Q: Which factory is it looking for?
    A: We don't know.

    Q: Has it found the factory it's looking for?
    A: We don't know.

    Q: What would it do if it finds it?
    A: It makes complex modifications to the system. Results of those modifications can not be deducted without seeing the actual environment. So we don't know.

    Q: Ok, in theory: what could it do?
    A: It could adjust motors, conveyor belts, pumps. It could stop a factory. With right modifications, it could cause things to explode.

    Q: Why is Stuxnet considered to be so complex?
    A: It uses multiple vulnerabilities and drops it's own drivers to the system.

    Q: How can it install it's own driver? Shouldn't drivers be signed for them to work in Windows?
    A: Stuxnet driver was signed with a certificate stolen from Realtek Semiconductor Corp.

    Q: Has the stolen certificate been revoked?
    A: Yes. Verisign revoked it on 16th of July. A modified variant signed with a certificate stolen from JMicron Technology Corporation was found on 17th of July.

    Q: What's the relation between Realtek and Jmicron?
    A: Nothing. But they have HQs in the same office park in Taiwan.

    Q: What vulnerabilities does Stuxnet exploit?
    A: Overall, Stuxnet exploit five different vulnerabilities, four of which were 0-days:
    LNK (MS10-046)
    Print Spooler (MS10-061)
    Server Service (MS08-067)
    Priviledge escalation via Keyboard layout file
    Priviledge escalation via Task Scheduler

    Q: And these have been patched by Microsoft?
    A: The two Priviledge escalations have not yet been patched.

    Q: Why was it so slow to analyse Stuxnet in detail?
    A: It's unusually complex and unusually big. Stuxnet is over 1.5MB in size.

    Q: When did Stuxnet start spreading?
    A: In June 2009, or maybe even earlier. One of the components has a compile date in January 2009.

    Q: When was it discovered?
    A: A year later, in June 2010.

    Q: How is that possible?
    A: Good question.

    Q: Was Stuxnet written by a government?
    A: That's what it would look like, yes.

    Q: How could governments get something so complex right?
    A: Trick question. Nice. Next question.

    Q: Was it Israel?
    A: We don't know.

    Q: Was it Egypt? Saudi Arabia? USA?
    A: We don't know.

    Q: Was the target Iran?
    A: We don't know.

    Q: Is it true that there's are biblical references inside Stuxnet?
    A: There is a reference to Myrtus (myrtle plant). However, this is not "hidden" in the code. It's an artifact left inside the program when it was compiled. Basically this tells us where the author stored the source code in his system. The specific path in Stuxnet is: \myrtus\src\objfre_w2k_x86\i386\guava.pdb. The authors probably did not want us to know they called their project "Myrtus", but thanks to this artifact we do. We have seen such artifacts in other malware as well. The Operation Aurora attack against Google was named Aurora after this path was found inside one of the binaries: \Aurora_Src\AuroraVNC\Avc\Release\AVC.pdb.

    Q: So how exactly is "Myrtle" a biblical reference?
    A: Uhh...we don't know, really.

    Q: How does Stuxnet know it has already infected a machine?
    A: It sets a Registry key with a value "19790509" as an infection marker.

    Q: What's the signifigance of "19790509"?
    A: It's a date. 9th of May, 1979.

    Q: What happened on 9th of May, 1979?
    A: Maybe it's the birthday of the author? Then again, on that date a Jewish-Iranian businessman called Habib Elghanian was executed in Iran. He was accused to be spying for Israel.

    Q: Oh.
    A: Yeah.

    Q: Is there a link between Stuxnet and Conficker?
    A: It's possible. Conficker variants were found between November 2008 and April 2009. First variants of Stuxnet were found shortly after that. Both exploit the MS08-067 vulnerability. Both use USB sticks to spread. Both use weak network passwords to spread. And, of course, both are unusually complex.

    Q: Is there a link to any other malware?
    A: Some Zlob variants were the first to use the LNK vulnerability.

    Q: Disabling Autorun in Windows will stop USB worms, right?
    A: Wrong. There are several other spreading mechanisms USB worms use. The LNK vulnerability used by Stuxnet would infect you even if Autorun and Autoplay were disabled.

    Q: Will Stuxnet spread forever?
    A: The current versions have a "kill date" of June 24, 2012. It will stop spreading on this date.

    Q: How many computers did it infect?
    A: Hundreds of thousands.

    Q: But Siemens has announced that only 15 factories have been infected.
    A: They are talking about factories. Most of the infected machines are collateral infections, ie. normal home and office computers that are not connected to SCADA systems.

    Q: How could the attackers get a trojan like this into a secure facility?
    A: For example, by breaking into a home of an employee, finding his USB sticks and infecting it. Then wait for the employee to take the sticks to work and infect his work computer. The infection will spread further inside the secure facility via USB sticks, eventually hitting the target. As a side effect, it will continue spread elsewhere also. This is why Stuxnet has spread worldwide.

    Q: Anything else it could do, in theory?
    A: Siemens announced last year that Simatic can now also control alarm systems, access controls and doors. In theory, this could be used to gain access to top secret locations. Think Tom Cruise and Mission Impossible.

    Q: Did Stuxnet sink Deepwater Horizon and cause the Mexican oil spill?
    A: No, we do not think so. Although it does seem Deepwater Horizon indeed did have some Siemens PLC systems on it.

    Q: Does F-Secure detect Stuxnet?
    A: Yes.

    Note: We have learned many of the details mentioned in this Q&A in discussions with researchers from Microsoft, Kaspersky, Symantec and other vendors.

    [ame]http://www.youtube.com/watch?v=ocuemvb46us[/ame]
    Video from Virus Bulletin 2010 where Symantec researcher Liam O'Murchu demonstrates a proof of concept Stuxnet-like SCADA modification that changes the operation of an air pump.

    Quelle: f-secure.com (Blog)
    ♫ *´¨)
    ¸.•´¸.•*´¨) ¸.•*¨♫ ♪
    (¸.•´ (¸.• ♫ ♪ Psychedelic



  2. Folgende Benutzer haben sich für diesen Beitrag bedankt:

    Rec.127 (01.10.2010)

  3. #2
    Super-Moderator Avatar von NoNameMT
    Registriert seit
    17.03.2008
    Beiträge
    655

    Standard

    Das sind mal nen paar nette Sachen über Stuxnet. Ich finde den Virus echt interessant und verfolge weiterhin die nächsten News

Ähnliche Themen

  1. [Global] Stuxnet - eine Cyber-Waffe?
    Von 100 im Forum Globale News / Szene News
    Antworten: 36
    Letzter Beitrag: 28.10.2010, 22:05
  2. [Global] Steckt der Mossad hinter "Stuxnet"?
    Von Bismarck_1 im Forum Globale News / Szene News
    Antworten: 18
    Letzter Beitrag: 04.10.2010, 00:51
  3. [Global] China angeblich von Stuxnet-Epidemie heimgesucht
    Von meckl im Forum Globale News / Szene News
    Antworten: 0
    Letzter Beitrag: 30.09.2010, 14:19
  4. [Szene] Verschwörungstheorien zu "Stuxnet"
    Von meckl im Forum Globale News / Szene News
    Antworten: 1
    Letzter Beitrag: 29.09.2010, 10:50

Stichworte

Berechtigungen

  • Neue Themen erstellen: Nein
  • Themen beantworten: Nein
  • Anhänge hochladen: Nein
  • Beiträge bearbeiten: Nein
  •