Download presentation
Presentation is loading. Please wait.
1
Stuxnet By Shane Serafin
2
Overview What is Stuxnet How it was spread How it was detected
What it exploited What it looked for What it did Who it attacked Who was behind it The after effects of Stuxnet The future of Stuxnet
3
What is Stuxnet? Name given to complex malware used for an attack on Iran’s Nuclear Facility First real cyber weapon So advanced estimated 20x more complex than previous virus codes Tens thousand plus lines of code Very professionally written Multiple languages like C, C++, and other object oriented languages Half a megabyte in size
4
How it was spread? Infected USB drives
Minimized risk of discover by only allowing it to spread to no more than three PCs then it stopped Released a year before it was discovered and drew any attention
5
How it was detected? Stayed dormant and didn’t attack
Had a real clearance that was stolen instead of a forged security clearance Told systems everything was fine after it attacked First reported in July 2010 by VirusBlokAda Computer in Iran facility was in reboot loop Sent information to a domain Set up sinkhole to reroute traffic
6
What it exploited? Security gaps that system creators are unaware of called “Zero Days” 12 million pieces of malware examined a year by researches with less than a dozen having it Successful viruses exploit a Zero Day Sell on Black Market for $100,000
7
What it looked for? Programmable logic controller called Siemens S7-300 Circuitry and software Iran’s nuclear facility Also used in traffic lights, assembly lines, oil pipelines, gas pipelines, water treatment, and electricity grids
8
What it did? Changed settings in centrifuges that spin nuclear material Sped up the spin cycle to damage it Needed replaced 10x faster
9
Who it attacked? Iran’s Nuclear enrichment facilities
Set the program back several years Open call to hackers to join Iranian Revolutionary Guard. (2nd largest online)
10
Who was behind it? Unknown, nothing was proven
Nation with funding and technology Suspects: USA Israel Russia
11
The After Effects of Stuxnet
New era of warfare begun Attacks on critical infrastructure in the US Defense Secretary Leon Panetta “there is a strong likelihood that next Pear Harbor we confront will be from a cyber attack” Enforcement officials stressing important on Cyber Security
12
The Future of Stuxnet Who will redesign it
Available online and is open source No telling who or what they will target
13
Video About Stuxnet
14
Questions
15
Sources who-is-behind.html xnet_the_best_malware_ever_?taxonomyId=85&pageNumb er=1 /stuxnet-computer-worm-opens-new-era-of- warfare detectives-deciphered-stuxnet/all/1
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.