Stuxnet

Stuxnet is a worm—a type of computer virus—that was first discovered in June 2010. Stuxnet quickly became one of the most publicized computer viruses in history because it was used to monitor and control computers that were involved in Iran’s nuclear program. Though no one has ever claimed responsibility for creating and installing Stuxnet, many computer experts believe that a nation or multiple nations developed the program. Some analysts believe that the United States and Israel created the worm and installed it on the Iranian computers to slow the country’s nuclear capability.

87323878-100220.jpg87323878-100219.jpg

How Stuxnet Works

Stuxnet is a worm that can monitor and control the computers on which it is installed. It generally targets industrial complexes such as plants, dams, banks, and processing centers. The program was designed specifically to attack industrial control systems built by Siemens AG, a German engineering firm. Stuxnet attacks software programs that run Supervisory Control and Data Acquisition (SCADA) systems. These systems are used in many different industrial applications, including water treatment centers and power generation facilities.

The worm is very complex and uses advanced techniques to avoid being detected by malware detection software (which helps identify, isolate, and delete viruses and other malware) and by humans. The program is unique because it locates and takes advantage of four different vulnerabilities in the software it is hacking. Previously, the cybersecurity community was unaware of all four of these vulnerabilities, demonstrating that the worm is extremely advanced and required many resources to produce.

Stuxnet is one of the most famous computer worms in history. It has been used to target larger industrial complexes. Nevertheless, computer security programs still attempt to protect personal computers against the virus.

Identification of Stuxnet

The Stuxnet virus is most famous for being used on computers in Iran, specifically computers that helped with uranium enrichment in that country. Experts believe that the virus was delivered to the Iranian Natanz nuclear plant through a worker using a USB drive. The worm infected computers and machines at Natanz and then traveled to other sites. Worms can move to different computers through networks.

The Stuxnet virus eventually installed itself on computers that controlled the plant’s centrifuges. It then sped up the centrifuges and caused them to spin irregularly. The altered spinning of the centrifuges was minimal so that the workers at the plant were not alarmed by the changes and the virus caused the computers to register all was operating normally. Nevertheless, the increase made the centrifuges wear down much more quickly than they would have on their own. This caused delays in enriching uranium. The worm also learned as much as it could about the Natanz nuclear plant and the Iranian nuclear program in general.

In 2010, the International Atomic Energy Agency (IAEA) was touring a uranium enrichment center in Iran and was confused by the high rates of failure it noticed with the center's centrifuges. A few months later, a computer security company in Belarus located malicious files on the Iranian computers. These malicious files were part of the Stuxnet virus, which had been causing the unprecedented failure rates with the centrifuges as well as other problems such as computers shutting down. The Stuxnet virus had been used as a weapon to slow the uranium enrichment process in Iran. By the time the worm was detected on Iranian computers, Stuxnet had already caused about one-fifth of Iran's centrifuges to break down.

Effects of Stuxnet

No person, group, or country admitted to creating and using the Stuxnet worm. However, experts believe that a program as complex as Stuxnet had to be created with the help of at least one national government. Many experts also believe that the United States and Israel worked together to form and release Stuxnet in Iran. Some military experts believe that the use of Stuxnet helped change modern warfare. Stuxnet was the first computer virus used as a weapon, and many experts believe that it opened the door for cyber warfare to become a large part of international conflicts.

Although the Stuxnet worm was originally released to infect Iranian computers and slow down Iranian uranium enrichment, the worm is now a threat to all companies, organizations, and infrastructures. Stuxnet has the potential to cripple power grids and stop water treatment centers. The Stuxnet worm or a similar program could greatly affect developed countries, including the United States. In fact, the American company Chevron admitted that its computer system was infected with the worm. Other organizations' computers may also have the worm, but it has not been detected yet. The Stuxnet worm has been located on many thousands of computers in Iran, Indonesia, Pakistan, Australia, the United Kingdom, the United States, and other countries. Although Stuxnet is potentially a powerful weapon, if an organization detects the malware, it can usually remove it and continue its operations as it normally would.

One result of the Stuxnet attack on cybersecurity in general is that it has made cybersecurity experts question the use of outside contractors. In general, large plants and organizations hire contractors to help with specific issues. Many times, however, these contractors are not cybersecurity experts. Because of their lack of security knowledge, these contractors can be targeted and used to gain access to important systems and sensitive information.

Bibliography

Bakic, Bojana, Milos Milic, Ilija Antovic, Dusan Savic, and Tatjana Stojanovic. "10 Years Since Stuxnet: What Have We Learned from This Mysterious Computer Software Worm?" 25th International Conference on Information Technology (IT), 2021, pp. 1-4, DOI: 10.1109/IT51528.2021.9390103. Accessed 30 Dec. 2022.

"Factbox: What Is Stuxnet?" Reuters. Thomson Reuters. 24 Sept. 2010. Web. 31 July 2015. http://www.reuters.com/article/2010/09/24/us-security-cyber-iran-fb-idUSTRE68N3PT20100924

Kelley, Michael B. "The Stuxnet Attack on Iran's Nuclear Plant Was 'Far More Dangerous' than Previously Thought." Business Insider. Business Insider Inc. 20 Nov. 2013. Web. 31 July 2015. http://www.businessinsider.com/stuxnet-was-far-more-dangerous-than-previous-thought-2013-11

Kushner, David. "The Real Story of Stuxnet." IEEE Spectrum. IEEE Spectrum. 26 Feb. 2013. Web. 31 July 2015. http://spectrum.ieee.org/telecom/security/the-real-story-of-stuxnet

Schneier, Bruce. "The Story Behind the Stuxnet Virus." Forbes. Forbes.com LLC. 7 Oct. 2010. Web. 30 July 2015. http://www.forbes.com/2010/10/06/iran-nuclear-computer-technology-security-stuxnet-worm.html

"The Stuxnet Worm." Norton by Symantec. Symantec Corporation. Web. 31 July 2015. http://us.norton.com/stuxnet

Zetter, Kim. "An Unprecedented Look at Stuxnet, the World’s First Digital Weapon." Wired. Condé Nast. 3 Nov. 2014. Web. 31 July 2015. http://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/