Stuxnet Richard Renner. James Bond virus Facts Earliest copy recovered from June 2009 512 KB in size First public knowledge July 2010 60% of infected.

Slides:



Advertisements
Similar presentations
Facts and Figures Facts and Figures 2006 Facts and Figures 2006.
Advertisements

Stuxnet, Duqu és társai – kifinomult internetes kártevők kifejlesztése, átalakítása, továbbfejlesztése Stuxnet, Duqu and others – development and operation.
Michael Thow Cyber Security Engineering Supervisor
Some Stuxnet Related Comments [excerpted from a longer presentation] Joe St Sauver, Ph.D.
Targeted Cyberattacks: A Superset of Advanced Persistent Threats Published in: Security & Privacy, IEEE (Volume:11, Issue: 1 ), Jan.-Feb. 2013,
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Security Presentation Topic : Smart Grid Security Lopamudra Roychoudhuri & Jayson G. Brown Summer Cyber Security Workshop 2014 Texas Tech University, Lubbock.
CONTROL SYSTEMS AND CYBER SECURITY 2600 MEETING JUNE 6,2014 MICHAEL TOECKER Mikhail Turcher, big fanci pantsie.
HALDEBIQUE Geoffroy ROYER Johan  Crime motivated attacks  Hacktivism  Cyber Warfare.
The 1-hour Guide to Stuxnet
"Why are Iran's nuclear technology efforts of critical concern to Israel's security?” Mike Natelson.
Stuxnet Malware Attribution Mike Albright CS 591 Fall 2010.
Novel Information Attacks From “Carpet Bombings” to “Smart Bombs”
Geneva, Switzerland, September 2014 Critical infrastructure protection: standardization to protect critical infrastructure objects Viacheslav Zolotnikov,
Stuxnet – Getting to the target Liam O Murchu Operations Manager, Symantec Security Response 1 Feb 2011.
SCADA – Are we self- sufficient? Presented by Jack McIntyre 15/05/2015Jack McIntyre2.
Trust, Safety, & Reliability Part 2 MALICE. Malware Malware: short for “malicious software” Hackers: people who write and deploy malware Worm: program.
STUXNET. Summary What is Stuxnet? Industial Control Systems The target/s of Stuxnet. How Stuxnet spreads. The impact of Stuxnet on PLC’s.
 Discovered in June/July 2010  Targeted Siemens software and equipment running Microsoft Windows  First malware for SCADA systems to spy and subvert.
Advanced Persistent Threats CS461/ECE422 Spring 2012.
Critical Information Infrastructure Protection: Urgent vs. Important Miguel Correia 2012 Workshop on Cyber Security and Global Affairs and Global Security.
How Stuxnet changed the landscape for plant engineers Richard Trout, Director for Client Solutions, Trout I.T.
Stuxnet The first cyber weapon.
Instilling rigor and imagination in analysis Countering the Iranian Nuclear Threat Stuxnet and its Broader Implications Randolph H. Pherson Mary C. Boardman.
A sophisticated Malware Arpit Singh CPSC 420
By: Sharad Sharma, Somya Verma, and Taranjit Pabla.
Jonathan Baulch  A worm that spreads via USB drives  Exploits a previously unknown vulnerability in Windows  Trojan backdoor that looks for a specific.
Active Worms CSE 4471: Information Security 1. Active Worm vs. Virus Active Worm –A program that propagates itself over a network, reproducing itself.
Red-DragonRising.com©. Red-DragonRising.com© Red-DragonRising.com©
MALWARE : STUXNET CPSC 420 : COMPUTER SECURITY PRINCIPLES Somya Verma Sharad Sharma Somya Verma Sharad Sharma.
COMPUTER ETHICS Computer ethics is the study of standards of right and wrong.
Iran v. Israel.  Israel:  Prime Minister Benjamin Netanyahu  joined the Israeli Defense Forces during the 1967 Six-Day War  He fought on the front.
Lessons from Stuxnet Matthew McNeill. Quick Overview Discovered in July 2011 Sophisticated worm - many zero-day exploits, Siemens programmable logic controller.
Computer Security By Richa Patel. Viruses A Virus is something that you can get on you on your computer which can damage documents on your computer. What.
Computer Viruses By Aidan Leitch and Eli Miloff. Background Info The first virus on the PC was created in Pakistan in 1986 by the Farooq Alvi brothers.
VirusesViruses HackingHacking Back upsBack ups Stuxnet Stuxnet.
 Stuxnet: The Future of Malware? Stephan Freeman.
Computer Security! By Tiffy O’Connell Viruses Backup Hackers.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Flame: Modern Warfare Matthew Stratton. What is Flame? How it was found What are its capabilities How it is similar to Stuxnet and Duqu Implications.
Dr. Richard Ford  Fundamental Definitions  What is Malcode?  Malcode Overview  Follows: Szor Ch.1 & 2.
Battles in Cyber Space Dr Richard E Overill Department of Informatics.
Iranians view life after nuclear pact with blend of skepticism and hope.
REPENTURN July 5, 2015 REPENTURN REPENTURN REPENTURN.
NEXT GENERATION ATTACKS & EXPLOIT MITIGATIONS TECHNIQUES ID No: 1071 Name: Karthik GK ID: College: Sathyabama university.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
History The worm was at first identified by the security company VirusBlokAda in mid-June Journalist Brian Krebs's blog posting on 15 July 2010.
Travis Deyarmin. In This Presentation  What is Stuxnet  What is Flame  Compare/Contrast  Who is Responsible  Possible Repercussions.
How a presumably military grade malware sabotaged the Iranian nuclear program W32.Stuxnet Presenter: Dolev Farhi |
Industrial Control System Cybersecurity
W32.Stuxnet How a presumably military grade malware sabotaged the Iranian nuclear program Presenter: Dolev Farhi |
Stuxnet By Shane Serafin.
STUXNET A Worm With A Purpose.
CSE 4471: Information Security
U.S. and Israeli Drone downed in Iranian Cyber Attack
An Act of Kindness -
Cybersecurity Case Study STUXNET worm
Chapter 3: Operating Systems
CIS 560 Innovative Education-- snaptutorial.com
CIS 560 Possible Is Everything/snaptutorial.com
CIS 560Competitive Success/tutorialrank.com
Propagation, behavior, and countermeasures
Object Oriented Programming and Software Engineering CIS016-2
Just Basic Lesson 17 Part 1 Mr. Kalmes.
3 Week A: May 1 – 19 3 Week B: May 22 – June 9
Cyber Security For Civil Engineering
Presentation transcript:

Stuxnet Richard Renner

James Bond virus

Facts Earliest copy recovered from June KB in size First public knowledge July % of infected Windows machines in Iran Natanz Nuclear Facility

Speculation Targeted Iranian nuclear program US and Israeli orgin More of its kind Flame, Duqu Obama administration authorizing Code named “Olympic Games”

Washington Post “The idea was to string it out as long as possible,” said one participant in the operation. “If you had wholesale destruction right away, then they generally can figure out what happened, and it doesn’t look like incompetence.” By Ellen Nakashima and Joby Warrick, Jun 02, :03 AM EDTEllen NakashimaJoby Warrick The Washington Post Published: June 2, 2012

Specific target Uranium Centrifuge First worm to tamper with infrastructure Frequency changes Destroyed 1000 out of 6000

PLC WinCC PCS 7 SCADA

Exploits

Questions?

Resources %20Targeting%20SCADA%20Systems.html %20Targeting%20SCADA%20Systems.html work-of-us-and-israeli-experts-officials- say/2012/06/01/gJQAlnEy6U_story.html work-of-us-and-israeli-experts-officials- say/2012/06/01/gJQAlnEy6U_story.html