Recommended Reading: Stuxnet’s more dangerous precursor, fake memories and more

Recommended Reading highlights the best long-form writing on technology in print and on the web. Some weeks, you’ll also find short reviews of books dealing with the subject of technology that we think are worth your time. We hope you enjoy the read.

Recommended Reading

Stuxnet’s Secret Twin (4,176 words)
by Ralph Langner, Foreign Policy
Pocket

Stuxnet is a pretty nasty nasty customer, especially if you happen to be a centrifuge used in the enrichment of uranium. Amazingly, the story of the first publicly acknowledged cyber weapon keeps getting more and more interesting. Ralph Langner has spent the last several years poring over code and other details of Stuxnet’s history and discovered there was an earlier version of the virus, that was even more destructive than the one unleashed on Iran’s nuclear facilities. Instead of putting the centrifuge’s motors in overdrive, it over pressurized them by closing valves designed to allow gas out. It sounds like a perfectly logical avenue of attack, until you realize that the potential for truly catastrophic failure would have quickly blown Stuxnet’s cover.

Filed under: , ,

Comments

The Stuxnet Worm Had an Evil Secret Twin

The Stuxnet Worm Had an Evil Secret Twin

It’s been over three years since the discovery of the Stuxnet worm, but new revelations continue to trickle out from the cybersecurity community. Actually, this latest one is more of a torrent than a trickle: Turns out Stuxnet had an evil secret twin.

Read more…


    



Stuxnet Did Not Infect The International Space Station (ISS)

Stuxnet Did Not Infect The International Space Station (ISS)Much news has broken about Stuxnet, a virus which was credited for sabotaging the Iranian uranium enrichment program, has found its way to the International Space Station, or the ISS for short. It was said that Stuxnet had gone rogue, especially when it has the ability to infect other machines via USB or optical media instead of the usual modus operandi of an Internet connection. Just in case you think that an apocalyptic scenario is about to unfold, fret not – the ISS has not been infected by Stuxnet, and all of the earlier reports have been blown out of proportion due to sensationalism.

Apparently, Kaspersky had never mentioned that Stuxnet had infected the International Space Station, but he did present a couple of separate and unrelated anecdotes. The first of the two was about non-specific malware being carried onboard the space station by astronauts, while the other had something to do with Stuxnet infecting a Russian nuclear-facility network. Kaspersky was cited to have said, “The space guys, from time to time, are coming with USBs, which are infected. I’m not kidding. I was talking to Russian space guys and they said, ‘Yeah, from time to time, there are [computer] viruses on the space station.’”

NASA was also quoted as saying, “Virus was never a threat to any of the computers used for cmd and cntl [command and control] and no adverse effect on ISS Ops [operations].” There you go, right from the horse’s mouth itself, the ISS is safe from any virus infection so you won’t find any rogue satellites causing havoc worldwide.

  • Follow: Computers, iss, stuxnet, ,
  • Stuxnet Did Not Infect The International Space Station (ISS) original content from Ubergizmo.

        



    Did a USB Stick Infect a Russian Nuclear Plant with Stuxnet?

    Did a USB Stick Infect a Russian Nuclear Plant with Stuxnet?

    There’s a common misconception that you need to be connected to the internet to get infected with malware. Well, that’s not true and, according to renowned cybersecurity expert Eugene Kaspersky, the folks at a nuclear power plant in Russia learned this the hard way.

    Read more…


        



    Kaspersky Labs preps its own OS to guard vital industry against cyberwarfare

    Kaspersky Labs preps its own OS to guard industry against cyberwarfare

    Kaspersky Labs’ namesake Eugene Kaspersky is worried that widely distributed and potentially state-sponsored malware like Flame and Stuxnet pose dire threats to often lightly protected infrastructure like communication and power plants — whatever your nationality, it’s clearly bad for the civilian population of a given country to suffer even collateral damage from cyberattacks. To minimize future chaos and literally keep the trains running, Kaspersky and his company are expanding their ambitions beyond mere antivirus software to build their own, extra-secure operating system just for large-scale industry. The platform depends on a custom, minimalist core that refuses to run any software that isn’t baked in and has no code outside of its main purposes: there’ll be no water supply shutdowns after the night watch plays Solitaire from an infected drive. Any information shared from one of these systems should be completely trustworthy, Kaspersky says. He doesn’t have details as to when the OS will reach behind-the-scenes hardware, but he stresses that this is definitely not an open-source project: some parts of the OS will always remain confidential to keep ne’er-do-well terrorists (and governments) from undermining the technology we often take for granted.

    Filed under:

    Kaspersky Labs preps its own OS to guard vital industry against cyberwarfare originally appeared on Engadget on Tue, 16 Oct 2012 13:28:00 EDT. Please see our terms for use of feeds.

    Permalink The Next Web  |  sourceEugene Kaspersky, Securelist  | Email this | Comments

    Security researchers dissect Flame’s handling program, find three new viruses ‘at large’

    Security researchers dissect Flame's handling program, find three new viruses 'at large'

    It seems that there’s more than two out-of-control computer viruses roaming around the Middle East. Security researchers think that a further three could be operating “at large,” with one positively identified on machines in Iran and Lebanon. Teams from Symantec and Kaspersky have separately found that the Flame malware had the electronic equivalent of a “handler,” a program called NEWSFORYOU, which is also in charge of three viruses that are code-named SP, SPE and IP. The two teams have been unsuccessful in finding a sample of the trio for analysis and despite finding a cache of data on a command-and-control server, decoding it is “virtually impossible.” While both security companies have declined to point a finger as to their origin, Reuters’ sources suggest the United States, while The Washington Post has been told that the project was a joint-enterprise with Israel — in keeping with the existing narrative that the pair were behind Stuxnet.

    Filed under: , ,

    Security researchers dissect Flame’s handling program, find three new viruses ‘at large’ originally appeared on Engadget on Mon, 17 Sep 2012 13:51:00 EDT. Please see our terms for use of feeds.

    Permalink   |  sourceReuters, Kaspersky, Symantec  | Email this | Comments

    An Unknown Hacker Group Claims That It Shut Down the World’s Largest Oil Company—And That They’ll Do It Again [Hacking]

    The NY Times is reporting that unknown computer hackers who call themselves “Cutting Sword of Justice” have claimed responsibility for spreading a malicious virus into Saudi Aramco, the Saudi government-owned oil company that’s also the world’s largest, and destroying three-quarters of all its computers. The hackers used a similar virus as the government created virus, Flame. More »

    Someone’s Trying To Shut Down Power Plants—With a Virus [Hacking]

    Earlier this year, a devastating virus dubbed Flame made its way through power plants in Iran, wreaking havoc on system software, and prompting the country to disconnect itself from the internet. Now comes word from Kaspersky Labs that there’s a copycat virus doing the same thing to “at least one organization in the energy sector.” More »

    Iran Is Quitting the Internet Because It’s Afraid of America [CyberWar]

    After being dominated by weaponized trojan horses on two different occasions, nuclear loudmouth Iran says it’s had enough: it’s unplugging from the Internet, hiding, and making its own. More »