![]() |
|
Sabotage of a specific process, in a specific plant -- the Stuxnet goal |
|
Date: 27 September 2010 Original URL: http://www.auscert.org.au/render.html?cid=7066&it=13405 As noted in our previous blogs, Symantec and other analysts have confirmed that the Stuxnet's primary purpose is to "modify the behavior of an industrial control system by modifying Programmable Logic Controllers (PLCs)". This can only be for the purposes of disruption and/or sabotage. While the targeted Siemen's products are used by a wide range industries, it is now known that a specific industrial application of the systems was the primary target of the attack. Siemens (17 September 2010) advised that: Further investigations have shown that the virus can theoretically influence specific processes and operations in a very specific automation environment or plant configuration in addition to passing on data. This means that the malware is able, under certain boundary conditions, to influence the processing of operations in the control system . However, this behavior has not yet been verified in tests or in practice. Symantec (21 September 2010) has confirmed this functionality:
Hence when the malware locates specific Siemen's SCADA products, it then looks for specific files which indicates the malware is in a specific process or plant. While speculation continues that the target was Iran's nuclear power program, at present, Iranian officials have only confirmed that staff of its Bushehr nuclear power plant had personal computers infected with the malware; it is still not clear whether these where personal computers used within, or physically or logically connected to the facility, or whether these PCs also had the targeted Siemen's software installed, or indeed whether other Iranian nuclear facilities have been affected.
http://www.symantec.com/connect/blogs/exploring-stuxnet-s-plc-infection-process |