Download presentation
Presentation is loading. Please wait.
Published byKimberly Dennis Modified over 8 years ago
2
History The worm was at first identified by the security company VirusBlokAda in mid-June 2010. Journalist Brian Krebs's blog posting on 15 July 2010 was the first widely read report on the worm. The original name given by VirusBlokAda was "Rootkit.Tmphider"; Symantec however called it "W32.Temphid", later changing to "W32.Stuxnet"
3
16 January 2011
4
7 Juillet 2013
5
5MB StuXnet
6
Design and organization Stuxnet is typically introduced to the target environment via an infected USB flash drive. %DriveLetter%\~WTR4132.tmp %DriveLetter%\~WTR4141.tmp %DriveLetter%\Copy of Shortcut to.lnk %DriveLetter%\Copy of Copy of Shortcut to.lnk %DriveLetter%\Copy of Copy of Copy of Shortcut to.lnk %DriveLetter%\Copy of Copy of Copy of Copy of Shortcut to.lnk LNK CVE-2010-2568
7
DD MDD Nigilant32 KnTDD Memoryze
8
Volatility
9
Trojan Dropper Win32/Stuxnet Trojan:WinNT/Stuxnet.A Trojan:WinNT/Stuxnet.B
12
807 - 1210 1410 2 1064
13
Microsoft Microsoft Windows 2000 Windows 95 Windows 98 Windows Me Windows NT Windows Server 2003 Windows Vista Windows XP Operating systems vulnerable
14
Target
16
Vacon based in Finland
17
Fararo Paya based in Iran
19
PLC-BLASTER
20
References
23
Mohammad Reza Foshtanghi Stuxnet Malware Analysis Islamic Azad University Of Sabzevar 1395/1/28
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.