Ergebnis 1 bis 2 von 2
  1. #1
    ٠•●• ॐ •●•٠ Avatar von meckl
    Registriert seit
    08.06.2007
    Beiträge
    749

    Standard China Likely Behind Stuxnet Attack, Cyberwar Expert Says

    China Likely Behind Stuxnet Attack, Cyberwar Expert Says

    Security expert connects the dots to China, not Israel, U.S.

    By Kelly Jackson Higgins
    Darkreading

    Israel and the U.S. so far have been pegged as the most likely masterminds behind the Stuxnet worm that targeted Iran's nuclear facility, but new research indicates China could instead be the culprit.

    Jeffrey Carr, founder and CEO of Taia Global, an executive cybersecurity firm, and author of Inside Cyber Warfare, says he has found several clues that link China to Stuxnet. ”Right now I'm very comfortable with the idea that this is an attack that emanated from China," Carr says. "I'm fairly certain this was China-driven."
    Carr, who blogged about his new theory today, says Vacon, the maker of one of the two frequency converter drives used in the Siemens programmable logic controller targeted by the Stuxnet worm, doesn't make its drives in its home country Finland, but rather in Suzhou, China.

    Chinese customs officials in March 2009 raided Vacon's Suzhou offices and took two employees into custody, allegedly due to some sort of "irregularities" with the time line of when experts think Stuxnet was first created, according to Carr. "Once China decided to pursue action against this company and detain two of its employees, they had access to everything -- this is where they manufacture the drives, so they would have easy access if they were looking for that material," such as engineering specifications, he says.

    A second connection uncovered by Carr is that the digital certificate pilfered by the Stuxnet attackers was RealTek Semiconductor's. RealTeck is headquartered in Taiwan, but has a subsidiary called Realsil Microelectronics in Suzhou, China.
    Carr also notes China's access to Windows source code, which would have given it ample access to finding the four zero-day flaws in Windows that were used to pull off the attack. Microsoft signed an agreement with the Chinese government in 2006 that gives officials access to most of Microsoft products' source code, including operating systems Windows 7, Vista, XP, and Server 2008. The deal was meant to assuage Chinese concerns about the security features in the software.

    Interestingly, China didn't report any Stuxnet infections until more than three months after Stuxnet was discovered, when media there said some 1 million machines were infected with the worm. Carr notes that Chinese AV firm Rising Antivirus International was the source of that data, and this is the AV firm that called on Chinese citizen to download its software to fight a virus that it actually created. "Considering this new information, RI's Stuxnet announcement sounds more like a CYA strategy from the worm's originators than anything else," Carr wrote in his blog.

    But Liam O Murchu, manager of operations at Symantec Security Response isn't sold on China -- or any particular nation at this point.

    "Stuxnet is a very sophisticated and well-funded threat. It seems clear that the group that developed Stuxnet also had access to proprietary information about one or more target industrial installations in Iran. The resources required to access such data is likely to be beyond the capability of most hacking groups, even if they had the motivation to create a worm targeting an industrial control system," Murchu says. Aside from specialized coding expertise, the group behind Stuxnet also had to have intimate knowledge of industrial control systems and access to those systems to perform quality of assurance testing, he says.

    "Symantec believes Stuxnet is likely the work of a government entity, but which nation state is behind the threat is still unknown to us," Murchu says.

    So why did Stuxnet end up spreading beyond its targeted PLCs at the Iranian nuclear facility? Carr says that question has yet to be answered. "Perhaps the design was intentional to spread to facilities we don't even know about, as Langner Communications said," Carr says. Or it just spread accidentally, he adds.

    Quelle: darkreading.com
    ♫ *´¨)
    ¸.•´¸.•*´¨) ¸.•*¨♫ ♪
    (¸.•´ (¸.• ♫ ♪ Psychedelic



  2. #2
    Kevin Mitnick
    Registriert seit
    03.06.2009
    Beiträge
    1.033

    Standard

    Er hat ja keine wirklichen Beweise, kann jeder Staat gewesen sein.



Ähnliche Themen

  1. [Global] China angeblich von Stuxnet-Epidemie heimgesucht
    Von meckl im Forum Globale News / Szene News
    Antworten: 0
    Letzter Beitrag: 30.09.2010, 14:19
  2. [C++] Anti Anubis, Threat Expert, Norman etc.
    Von Beaving im Forum C, C++
    Antworten: 8
    Letzter Beitrag: 29.04.2009, 13:33

Stichworte

Berechtigungen

  • Neue Themen erstellen: Nein
  • Themen beantworten: Nein
  • Anhänge hochladen: Nein
  • Beiträge bearbeiten: Nein
  •