Software smart bomb fired at Iranian nuclear plant: experts

September 24, 2010 by Glenn Chapman

Computer security experts are studying a scary new cyber weapon: a software smart bomb that may have been crafted to find and sabotage a nuclear facility in Iran.

Malicious software, or malware, dubbed "Stuxnet" is able to recognize a specific facility's control network and then destroy it, according to German computer security researcher Ralph Langner.

"Welcome to ," Langner said in a post at his website. "This is sabotage."

Langner has been analyzing Stuxnet since it was discovered in June and said the code had a technology fingerprint of the control system it was seeking and would go into action automatically when it found its target.

"It's pretty amazing," James Lewis, a senior fellow at the Center for Strategic and International Studies, told AFP on Thursday. "It looks like more than simple cyber espionage."

Stuxnet was tailored for Siemens supervisory control and data acquisition (SCADA) systems commonly used to manage water supplies, oil rigs, and other industrial facilities.

It traveled by sneaking onto USB memory sticks and was able to thereby hop from system to system without needing the Internet, according to Roel Schouwenberg, senior anti-virus researcher at Kaspersky Lab Americas.

Stuxnet is considered a malware "worm" because it burrows from machine to machine, replicating itself on the way.

Once in a computer system running on Windows software, Stuxnet checked for any of three Siemens SCADA programmable logic controllers (PLCs) that manage functions such as cooling or turbine speed, Schouwenberg told AFP.

If there was a match, Stuxnet automatically took over control of the PLC and hid any changes from workers operating or managing a system, according to Schouwenberg.

"When the operator looks at the plant, everything will look just fine," Schouwenberg said. "Meanwhile, the machine will be overloading. Its ultimate goal is cyber sabotage."

"Stuxnet manipulates a fast running process," Langner explained at his website. "We can expect that something will blow up soon. Something big."

The software saboteur has been found lurking on systems in India, Indonesia, Pakistan and elsewhere, but the heaviest infiltration appeared to be in Iran, according to software security researchers.

"This was assembled by a highly qualified team of experts, involving some with specific control system expertise," Langner said.

"This is not some hacker sitting in the basement of his parents' house. The resources needed to stage this attack point to a nation state."

The pattern of spread correlated somewhat with jobs handled by a firm commissioned to work at nuclear facilities, according to researchers.

Langner suspected Stuxnet's mark was the Bushehr nuclear facility in Iran. Unspecified problems have been blamed for a delay in getting the facility fully operational.

On August 31, Iranian atomic chief Ali Akbar Salehi blamed "severe hot weather" for a delay in moving fuel rods into its Russian-built first nuclear power plant.

"Look at the Iranian nuclear program," Langner said. "Strange -- they are presently having some technical difficulties down there in Bushehr."

There have been Stuxnet infections all over the world and it was impossible to be certain the target was Iran, Schouwenberg cautioned.

Stuxnet creators left plenty of clues in the malware, giving the impression they didn't fear being caught, according to Langner.

"The whole attack only makes sense within a very limited timeframe," Langner said. "After Stuxnet is analyzed, the attack won't work any more. It's a one-shot weapon."

Microsoft has already patched two of four Windows operating system vulnerabilities exploited by Stuxnet, according to Schouwenberg.

"For the most part, Stuxnet has been mitigated," the researcher said. "The question now is whether this is going to be a one-off thing or is it setting a precedent?"

Explore further: Hole Found in Protocol Handling Vital National Infrastructure

Related Stories

Worms infesting computers worldwide: Microsoft

November 2, 2009

A Microsoft security report released Monday warns that cyber crooks are digging into computers for weak spots to penetrate with worms -- malicious software that steals control or data.

Microsoft probing new hole in IE security

February 3, 2010

Fresh from patching an Internet Explorer (IE) flaw exploited in cyberattacks on Google and other firms, Microsoft is looking into a newly exposed vulnerability in the browser software.

Russia: Iran's nuclear plant to get fuel next week

August 13, 2010

(AP) -- Russia will load fuel into Iran's first nuclear power plant next week despite U.S. demands to prevent Iran obtaining nuclear energy until the country proves that it's not pursuing a weapons capacity, officials said ...

Recommended for you

Internet giants race to faster mobile news apps

October 4, 2015

US tech giants are turning to the news in their competition for mobile users, developing new, faster ways to deliver content, but the benefits for struggling media outlets remain unclear.

Radio frequency 'harvesting' tech unveiled in UK

September 30, 2015

An energy harvesting technology that its developers say will be able to turn ambient radio frequency waves into usable electricity to charge low power devices was unveiled in London on Wednesday.

Professors say US has fallen behind on offshore wind power

September 29, 2015

University of Delaware faculty from the College of Earth, Ocean, and Environment (CEOE), the College of Engineering and the Alfred Lerner School of Business and Economics say that the U.S. has fallen behind in offshore wind ...

1 comment

Adjust slider to filter visible comments by rank

Display comments: newest first

5 / 5 (4) Sep 24, 2010
This is a red herring. Nuclear plants must not be controlled via Windows.

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.