'One of a kind' Stuxnet worm remains a serious mystery

 

Connecting state and local government leaders

Stuxnet is a "game-changing" threat to critical infrastructure security, though much about it remains unknown, industry and government security experts told a Senate committee.

Industry and government security experts testifying Wednesday called the Stuxnet worm a wake-up call for critical infrastructure security because of its ability to manipulate control systems for physical industrial processes.

“Stuxnet is one of a kind,” said Sean McGurk, acting director of the Homeland Security Department’s National Cybersecurity and Communications Integration Center, which did some of the early analysis of the malicious code. “It is a game changer.” He spoke at a hearing before the Senate Homeland Security and Governmental Affairs Committee.

In the past, automated systems that control physical infrastructure or industrial processes have been breached by nontargeted threats that attack the information technology systems with which they are connected, said Michael J. Assante, CEO of the National Board of Information Security Examiners, a nonprofit certification group. But Stuxnet has taken the threat to a new level because it specifically targets control systems and has the ability to reprogram logical controllers to change or interrupt physical processes.

These changes could be subtle, resulting in minor changes to a finished product, or they could destroy a system. The one bright spot in Stuxnet is that it is so sophisticated it is not likely to be a common threat.

“It is an incredibly large and complex threat,” said Dean Turner, director of Symantec’s Global Intelligence Network, which has studied the worm. “Only a select few groups are capable of creating such an attack.”

But its threat is real, and Symantec has identified 44,000 unique Stuxnet infections worldwide, 60 percent of them in Iran, where it is believed the infection started with a USB drive containing the code.


Related coverage:

Stuxnet reveals vulnerabilities in industrial controls


Stuxnet was discovered in June, and DHS received its first sample of the code from the German CERT, which obtained it from a German manufacturer of control equipment that appears to be targeted by the worm.

“The device is ubiquitous,” McGurk said of the equipment. It is used around the world in agriculture, energy generation and distribution, water treatment and manufacturing.

Despite the analysis of the Stuxnet code, much still remains unknown about it, particularly who created it and who its target is. Because it is focused in Iran and seems to target a specific type of equipment used in that country’s nuclear enrichment plants, there has been speculation that Iran’s nuclear program was the target and that it was created by another country, possibly Israel or the United States.

But neither McGurk nor Turner would speculate about the worm’s target or its origin.

“Nothing in the code points to a specific point of origin,” McGurk said. It is assumed that the authors were well financed, but that does not necessarily mean it was a government project, he said. Organized cybercriminals also could have access to the money and resources needed to create the worm.

As for its target, “it would require an incredible amount of knowledge” to identify it, McGurk said.

Turner said the speculation about the authors, based on the apparent target, is just that – only speculation.

The hearing was called by committee chairman Sen. Joseph Lieberman (I-Conn.) and ranking Republican Sen. Susan Collins of Maine, who have co-sponsored a comprehensive cybersecurity bill now pending in the Senate. Industry representatives testifying Wednesday support passage of the bill as part of an effort to create a more unified, risk-based approach to IT security across both the public and private sectors. The bill would give DHS’ National Center for Cybersecurity and Communications the lead in coordinating efforts between government and industry.

The Protecting Cyberspace as a National Asset Act, S. 3480, was passed out of the committee in June but the Senate has not taken action on it. The sitting 111th Congress has time to consider the bill during the short time remaining before the introduction of the 112th Congress, which Collins urged it to do.

“I personally think it is an ideal issue for the lame-duck Congress to take up,” she said.

Lieberman expressed little hope that the bill would be passed by this Congress. “It’s unfortunate that the clock will run out on us before we have a chance to complete negotiations with other committees and with the administration, who I regret to say did not engage as early in the process of developing this legislation as was necessary,” he said.

Assante summed up a number of steps that industry believes are necessary to close the security gap in the physical critical infrastructure:

  • Remove and remediate weaknesses, vulnerabilities and security designs in industrial control systems.
  • Design and integrate security and forensic tools into control environments, while investing in people.
  • Prioritize efforts based on consequences of directed and well-resourced attacks against high-risk segments of the critical infrastructure.
  • Organize a well-funded, multi-year research & development program to design a more resilient infrastructure.
  • Establish risk-based performance requirements that value learning and promote innovation. Legislation should include better defined federal authority to address specific and imminent cybersecurity threats to critical infrastructures with emergency measures.
  • Require critical infrastructure asset owners and control system vendors to report industrial control system specific security incidents, and the government must provide up-to-date information to asset owners and operators.
  • Invest in the workforce that defends and operates infrastructure systems.

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.