Travis Deyarmin. In This Presentation  What is Stuxnet  What is Flame  Compare/Contrast  Who is Responsible  Possible Repercussions.

Slides:



Advertisements
Similar presentations
By Kathryn DuFresne. WHAT are computer ethics? Computer Ethics is a branch of practical philosophy which deals with how computing professionals should.
Advertisements

By Hiranmayi Pai Neeraj Jain
Stuxnet Richard Renner. James Bond virus Facts Earliest copy recovered from June KB in size First public knowledge July % of infected.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 41 StuxNet, Cross Site Scripting & Cross Site Request Forgery.
How Stuxnet Spreads: A Study of Infection Paths in Best Practice Systems Joel Langill Chief Security Officer Eric Byres Chief Technology Officer Andrew.
Targeted Cyberattacks: A Superset of Advanced Persistent Threats Published in: Security & Privacy, IEEE (Volume:11, Issue: 1 ), Jan.-Feb. 2013,
Security Presentation Topic : Smart Grid Security Lopamudra Roychoudhuri & Jayson G. Brown Summer Cyber Security Workshop 2014 Texas Tech University, Lubbock.
CONTROL SYSTEMS AND CYBER SECURITY 2600 MEETING JUNE 6,2014 MICHAEL TOECKER Mikhail Turcher, big fanci pantsie.
Rob Gaston 04/04/2013 CIS 150. Cyber Warfare  U.S. government security expert Richard A. Clarke, Cyber War (May 2010): "cyber warfare" is "actions by.
HALDEBIQUE Geoffroy ROYER Johan  Crime motivated attacks  Hacktivism  Cyber Warfare.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Real world example: Stuxnet Worm. Overview Primary target: industrial control systems –Reprogram Industrial Control Systems (ICS) –On Programmable Logic.
Stuxnet Malware Attribution Mike Albright CS 591 Fall 2010.
Novel Information Attacks From “Carpet Bombings” to “Smart Bombs”
Slides to add  Botnet slides  Security regulations  Do we have similar laws for transportation?  Terrorism (look for some examples if possible)  Company.
Cyber-Warfare: The Future is Now!
Stuxnet – Getting to the target Liam O Murchu Operations Manager, Symantec Security Response 1 Feb 2011.
Trust, Safety, & Reliability Part 2 MALICE. Malware Malware: short for “malicious software” Hackers: people who write and deploy malware Worm: program.
The Rapid Evolution of Information Security: A Game of Spy vs Spy John A. Copeland Weitnaur Chair Professor, Georgia Institute of Technology.
STUXNET. Summary What is Stuxnet? Industial Control Systems The target/s of Stuxnet. How Stuxnet spreads. The impact of Stuxnet on PLC’s.
 Discovered in June/July 2010  Targeted Siemens software and equipment running Microsoft Windows  First malware for SCADA systems to spy and subvert.
How Stuxnet changed the landscape for plant engineers Richard Trout, Director for Client Solutions, Trout I.T.
Stuxnet The first cyber weapon.
Instilling rigor and imagination in analysis Countering the Iranian Nuclear Threat Stuxnet and its Broader Implications Randolph H. Pherson Mary C. Boardman.
1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.
A sophisticated Malware Arpit Singh CPSC 420
By: Sharad Sharma, Somya Verma, and Taranjit Pabla.
Mr. Mark Welton.  The five game changing viruses  Security best practices that deal with the problems.
Jonathan Baulch  A worm that spreads via USB drives  Exploits a previously unknown vulnerability in Windows  Trojan backdoor that looks for a specific.
Active Worms CSE 4471: Information Security 1. Active Worm vs. Virus Active Worm –A program that propagates itself over a network, reproducing itself.
MALWARE : STUXNET CPSC 420 : COMPUTER SECURITY PRINCIPLES Somya Verma Sharad Sharma Somya Verma Sharad Sharma.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Lessons from Stuxnet Matthew McNeill. Quick Overview Discovered in July 2011 Sophisticated worm - many zero-day exploits, Siemens programmable logic controller.
Computer Security By Richa Patel. Viruses A Virus is something that you can get on you on your computer which can damage documents on your computer. What.
VirusesViruses HackingHacking Back upsBack ups Stuxnet Stuxnet.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
 Stuxnet: The Future of Malware? Stephan Freeman.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Topic 5: Basic Security.
Search Worms, ACM Workshop on Recurring Malcode (WORM) 2006 N Provos, J McClain, K Wang Dhruv Sharma
Flame: Modern Warfare Matthew Stratton. What is Flame? How it was found What are its capabilities How it is similar to Stuxnet and Duqu Implications.
Stuxnet.
Battles in Cyber Space Dr Richard E Overill Department of Informatics.
Security Mindset Lesson Introduction Why is cyber security important?
Securing the Electronic Frontier Ch. 6 Reading: pp ; ; CS 340.
Ron McFarland, Ph.D. Kaplan University IT200: Software Engineering.
NEXT GENERATION ATTACKS & EXPLOIT MITIGATIONS TECHNIQUES ID No: 1071 Name: Karthik GK ID: College: Sathyabama university.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Evolution of Computer Viruses A Technical Presentation by: Logan Kallop.
From viruses to theft Joakim von Braun Security Consultant von Braun Security Consultants Uppsala universitet
Network Attacks Instructor: Dr. X. Outline Worms DoS.
History The worm was at first identified by the security company VirusBlokAda in mid-June Journalist Brian Krebs's blog posting on 15 July 2010.
How a presumably military grade malware sabotaged the Iranian nuclear program W32.Stuxnet Presenter: Dolev Farhi |
Virtualisation in Education: Information Security Lab in Your Pocket Alexandre Karlov, JINR
Evolution of Computer Viruses
International Conflict & Cyber Security
W32.Stuxnet How a presumably military grade malware sabotaged the Iranian nuclear program Presenter: Dolev Farhi |
Hacking Demo Part 2 Attack Phases
Stuxnet By Shane Serafin.
STUXNET A Worm With A Purpose.
Cybersecurity Case Study STUXNET worm
CIS 560 Innovative Education-- snaptutorial.com
CIS 560 Possible Is Everything/snaptutorial.com
CIS 560 Education for Service-- snaptutorial.com.
CIS 560Competitive Success/tutorialrank.com
CIS 560 Education for Service-- tutorialrank.com.
CIS 560 Teaching Effectively-- snaptutorial.com
Propagation, behavior, and countermeasures
Object Oriented Programming and Software Engineering CIS016-2
1:53:58 AM.
Presentation transcript:

Travis Deyarmin

In This Presentation  What is Stuxnet  What is Flame  Compare/Contrast  Who is Responsible  Possible Repercussions

Stuxnet  Worm  Used 5 Zero-Days  Targets Siemens Control Software  Infected Through USB/Network  Destroyed Uranium Enrichment Centrifuges

Stuxnet

Flame  Sniffs Network  Screenshots  Recording Audio  Keylogger  Bluesnarfing  20 Expansion Modules

Flame

 Ways of infection were similar to Stuxnet  The Autorun.inf hacking was used by both  Used the same print spooler vulnerability

Flame

Similarities  Propagation  Shared a common module for EoP (0-day)  C&C servers scattered worldwide  Sharing Module

Differences StuxnetFlame  Sabotage  Specific  Hit PLC  Espionage  Adaptive  Hit Computers  20Mb

Who’s to Blame?  Joint op between US and Israel

 Made this kind of attack a political option  Source code is available Consequences

Conclusion  Stuxnet and Flame were worms targeted at Iran  Probable US involvement  Repercussions

References   industry-but-was-defeated-with-data-recovered/ industry-but-was-defeated-with-data-recovered/    me me   t_dossier.pdf t_dossier.pdf