In the wrong hands, er, in someone's hands.....
Israeli Test on Worm Called Crucial in Iran Nuclear DelayBy WILLIAM J. BROAD, JOHN MARKOFF and DAVID E. SANGER
Published: January 15, 2011
This article is by William J. Broad, John Markoff and David E. Sanger.
The Dimona complex in the Negev desert is famous as the heavily guarded heart of Israel’s never-acknowledged nuclear arms program, where neat rows of factories make atomic fuel for the arsenal.
Over the past two years, according to intelligence and military experts familiar with its operations, Dimona has taken on a new, equally secret role — as a critical testing ground in a joint American and Israeli effort to undermine Iran’s efforts to make a bomb of its own.
Behind Dimona’s barbed wire, the experts say, Israel has spun nuclear centrifuges virtually identical to Iran’s at Natanz, where Iranian scientists are struggling to enrich uranium. They say Dimona tested the effectiveness of the Stuxnet computer worm, a destructive program that appears to have wiped out roughly a fifth of Iran’s nuclear centrifuges and helped delay, though not destroy, Tehran’s ability to make its first nuclear arms.
“To check out the worm, you have to know the machines,” said an American expert on nuclear intelligence. “The reason the worm has been effective is that the Israelis tried it out.”
http://www.nytimes.com/2011/01/16/world/middleeast/16stuxnet.html?_r=2&hpIsraeli security chief celebrates Stuxnet cyber attack
A showreel played at a retirement party for the head of the Israeli Defence Forces has strengthened claims the country's security forces were responsible for a cyber attack on the Iranian nuclear programme.
"The video of Lieutenant General Gabi Ashkenazi's operational successes included references to Stuxnet, a computer virus that disrupted the Natanz nuclear enrichment site last year, Ha'aretz reported.
Although Israel has not officially accepted responsibility for the Stuxnet attack, evidence of its role has been mounting since it was first discovered last July. The virus, unprecedented in its sophistication, was designed to infiltrate the control systems at Natanz and make hidden, damaging adjustments to vital centrifuges.
Attributing the source of cyber attacks in notoriously difficult, but security researchers say factors including complexity of the operation, which would have required human sources inside the Iranian nuclear programme, point strongly to the Israeli security forces. It has also been reported by The New York Times that a special facility was set up with American cooperation in the Israeli desert to test the weapon.
Immediately after the section on Stuxnet, the video tribute to Lt Gen Ashkenazi included a message from Meir Dagan, who was head of Israel's secret intelligence service Mossad during virtually all of Lt Gen Ashkenazi's time in charge of the IDF..."
http://www.telegraph.co.uk/technology/news/8326274/Israeli-security-chief-celebrates-Stuxnet-cyber-attack.htmlExperts: Stuxnet Changed the Cybersecurity Landscape
By Grant Gross, IDG News
"The appearance of the Stuxnet worm in June should serve as a wake-up call to governments and businesses, especially those relying on Internet-based industrial control systems, a group of cybersecurity experts told U.S. lawmakers Wednesday.
The sophisticated Stuxnet is a "game changer" for companies and governments looking to protect their networks, said Sean McGurk, acting director of the National Cybersecurity and Communications Integration Center in the U.S. Department of Homeland Security. Stuxnet, likely developed by a well-financed team, modifies files of the software running industrial control systems and can also steal the data contained there without the owner knowing it, he told the U.S. Senate Homeland Security and Governmental Affairs Committee.
"We have not seen this coordinated effort of information technology vulnerabilities and industrial control exploitation completely wrapped up in one unique package," McGurk said.
Stuxnet illustrates the need for governments and businesses to adopt new approaches to cyberthreats, added Michael Assante, president and CEO of the National Board of Information Security Examiners. "Stuxnet is, at the very least, an important wake-up call for digitally enhanced and reliant countries, and at its worst, a blueprint for future attackers," he said..."
http://www.pcworld.com/businesscenter/article/210971/experts_stuxnet_changed_the_cybersecurity_landscape.htmlClear and Present Danger: Open Letter to Symantec
"...3. You fail to understand that with the tools mentioned, it is possible to create an attack tool that completely bypasses the vendor’s software and directly attacks PLCs on the network. You fail to understand that in modern installations in the private sector, up to several thousand PLCs per installation are connected to flat networks.
4. You fail to understand that with the basic attack technology copied from Stuxnet, it is even possible to write malicious code that uses PLCs as a launch pad for carried-forward attacks against peer PLCs. You fail to understand that attempts to recover from such attacks require all process network stations to be shut down simultaneously.
5. You fail to understand that potential usage of the attack technology contained in Stuxnet is not limited to APT-style directed attacks with insider knowledge, but can also be used for non-directed attacks in hit-and-run scenarios where the emphasis is on brute-force process disruption, requiring zero insider knowledge.
6. You fail to understand that the hacker underground has been studying control systems for years without any success. You fail to understand that this community will eagerly dismantle Stuxnet as a blueprint for how to cyber-attack installations from the cookie plant next door to power plants..."
Regards
Ralph Langner
Langner Communications GmbH
Fossredder 12, D-22359 Hamburg, Germany
http://www.langner.com/enhttp://www.langner.com/en/2010/10/11/stuxnet-logbook-oct-11-2010-1100-hours-mesz/