News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
GET RECOGNIZED
Let an ISACA® certification elevate your career.
Register today and save
You are here: Home / Network Security / Stuxnet Hit on Utility Signals New Era
DDoS Protection Powered By Verisign
Stuxnet Strike on U.S. Utility Signals Disturbing Trend
Stuxnet Strike on U.S. Utility Signals Disturbing Trend
By Mark Long / NewsFactor Network Like this on Facebook Tweet this Link thison Linkedin Link this on Google Plus
PUBLISHED:
NOVEMBER
21
2011



U.S. security experts say a variant of the Stuxnet computer worm caused the destruction of a water pump at a public utility in Springfield, Ill., last week. Discovered in June of last year, Stuxnet targets the Windows-based supervisory control and data acquisition (SCADA) systems developed by Siemens to control and monitor specific industrial processes.

Though the destruction of a pump might not seem like such a big deal, there are oil pipelines, power plants, large communication systems, airports, ships and even military installations around the world using similar control systems. An earlier cyber attack targeting a control system at a hydroelectric facility in Russia killed more than 70 people in 2009.

The potential threats posed by cyber warfare are only outranked by nuclear bombs and other weapons of mass destruction, warned Gen. Keith Alexander, the commander of U.S. Cyber Command and director of the National Security Agency.

"When you look at the vulnerabilities that we face in this area, it's extraordinary," Alexander said earlier this month. "What we see is a disturbing trend -- from exploitation to disruption to destruction."

A New Cyber Arms Race

What's worse, Stuxnet may merely be the prototype for more powerful next-generation cyber weapons that ultimately will make the Web the new battleground in an ever-widening arms race.

"In the past there were just cyber criminals," said Kaspersky Lab CEO Eugene Kaspersky. "Now I am afraid it is the time of cyber terrorism, cyber weapons and cyber wars," he warned the security industry in a speech delivered in November of last year.

The first known Stuxnet variants uncovered were specifically aimed at Iran-based organizations with probable ties to the nation's nuclear energy program. The sophistication of the worm's coding and other factors have led computer security experts to believe that Stuxnet was a state-sponsored worm specifically constructed for conducting cyber warfare.

"This piece of malware was designed to sabotage plants, to damage industrial systems," Kaspersky said.

Protective Measures

Last week the worm turned, and this time the target was an industrial installation in the United States. According to Applied Control Systems cyber security expert Joseph Weiss, it appears that the attack on the Illinois water utility had actually been under way for weeks prior to the pump's destruction.

"Minor glitches were observed in remote access to the SCADA system for two to three months before it was identified as a cyber attack," Weiss wrote in a blog. "It is believed the SCADA software vendor was hacked and customer usernames and passwords stolen."

To protect U.S. military installations, the U.S. Defense Department is evaluating a possible move to more-secure cloud computing environments, which would prevent foreign adversaries from targeting any single computer server.

As part of a more dynamic perimeter defense network, Alexander is also considering the creation of special "hunter teams" that could actively seek out and defuse potential cyber threats before they actually cause damage.

Tell Us What You Think
Comment:

Name:

Jack:

Posted: 2011-11-29 @ 7:52am PT
Hoax.

admingal.com:

Posted: 2011-11-21 @ 4:04pm PT
Water plan used a 3-character password, this was not cyber-terrorism...

Steve Anderson:

Posted: 2011-11-21 @ 3:42pm PT
How did it destroy a water pump???

The story sucks, give real details.

Its like a S/W designer, NO Value! NO details!

Was the code written in COBOL???

Like Us on FacebookFollow Us on Twitter
TOP STORIES NOW
MAY BE OF INTEREST
Salesforce.com is the market and technology leader in Software-as-a-Service. Its award-winning CRM solution helps 82,400 customers worldwide manage and share business information over the Internet. Experience CRM success. Click here for a FREE 30-day trial.
MORE IN NETWORK SECURITY
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Russian Gang with Stolen IDs Hacks Hosting Company
In August, a Russian cyber gang obtained what researchers called “the largest cache of stolen data." Now, those hackers may be putting their ill-gotten gains to criminal use.
 
Dairy Queen Latest Retailer To Report Hack
Known for its hot fries and soft-serve ice cream, Dairy Queen just made cyber history as the latest victim of a hack attack. The fast food chain said that customer data at some stores may be at risk.
 
Lessons from the JPMorgan Chase Cyberattack
JPMorgan Chase is investigating a likely cyberattack. The banking giant is cooperating with law enforcement, including the FBI, to understand what data hackers may have obtained.
 

Enterprise Hardware Spotlight
AMD's New FX Series CPU Breaks Processing Speed Record
The new FX-8370 processor from Advanced Micro Devices has set a record for silicon processor speed, the company announced. Overclocked, the eight-core chip was measured at 8722.78 MHz.
 
Intel Intros Lightning-Fast PC Processors
Call it extreme. Intel just took the covers off its first-ever eight-core desktop processor, which is aimed at hardcore power users who expect more than the status quo from their computers.
 
HP Previews ProLiant Gen9 Data Center Servers
Because traditional data center and server architectures are “constraints” on businesses, HP is releasing new servers aimed at faster, simpler and more cost-effective delivery of computing services.
 

Mobile Technology Spotlight
Rumor Mill Puts Mobile Wallet in iPhone 6
Apple is moving toward the mobile wallet world with its next iPhone. The tech giant has partnered with retailers, banks and major payment networks to make it happen, according to Bloomberg.
 
Will iPhone Finally Catch Up with NFC Mobile Payment Ability?
Apple's latest version of the iPhone may have a mobile wallet to pay for purchases with a tap of the phone. The iPhone 6 reportedly is equipped with near-field communication (NFC) technology.
 
Visual Search To Shop: Gimmick or Game Changing?
Imagine using your phone to snap a photo of the cool pair of sunglasses your friend is wearing and instantly receiving a slew of information about the shades along with a link to order them.
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | CRM Systems | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech | Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.