CRN
  • Home
  • News
  • Security

Stuxnet 'much more sophisticated than Aurora'

By Tom Brewster on Sep 24, 2010 10:47AM
Stuxnet 'much more sophisticated than Aurora'

In The Spotlight

Introducing the CRN State of the MSP report

IoT Explained: What is the Internet of Things in Australia (June 2022)

Come to CRN's CyberSecurity Live Event!

See who was at Channel Meets: UC in Sydney

Stuxnet is considerably more impressive than the malicious software used in the Aurora attack that hit Google last year, according to a threat researcher.

The Stuxnet worm is far more sophisticated than the malware which, according to Google, emanated from China and was used to steal intellectual property from the search giant, claimed Stefan Tanase, a senior security researcher from Kaspersky.

Speaking at a press event in Munich, Tanase noted how Stuxnet can be controlled in two different ways – via a command and control centre, as well as through peer-to-peer connections, where infected machines communicate with one another.

This dual power means Stuxnet can update even when a command and control centre is taken out – something the Aurora malware was unable to do.

Furthermore, Stuxnet exploits vulnerabilities in Windows operating systems from XP through to Windows 7. Aurora only exploited a flaw in Internet Explorer 6, a notably old version of the browser.

The worm also uses stolen signatures from two different companies to dupe people into downloading what they believe to be a legitimate file. This makes it difficult for anyone to know which files to trust and signed malware is likely to become more prevalent in the future, Tanase claimed.

“Stuxnet is the first moment where cyber crime is moving from pick-pocketing, stealing bucks from as many people as possible, to things that really affect the infrastructure and really affect our power plants, our factories, our systems,” Tanase said.

“I think that attacks like Stuxnet are too complex to become mainstream, I don’t think they will be in everyday use in the future, but targeted attacks will continue.”

Companies do not like to disclose being hit by worms or malware as serious as Stuxnet and so many events will slip under the radar, Tanase added.

As previously reported by IT PRO, Stuxnet has the potential to take over industrial control systems, meaning it could conceivably be used to change cooling levels in power plants or bring a halt to production lines.

Due to the sophistication and money it would have taken to produce Stuxnet it is believed by some that the worm has been created with state backing, and Tanase’s suspicion is that this is true.

There is currently no evidence of any damaging effects on industrial plants as yet, but Tanase believes if an event did happen then the organisations involved would most likely not disclose what happened.

This article originally appeared at itpro.co.uk

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © ITPro, Dennis Publishing
Tags:
aurora kaspersky security sophisticated stuxnet than

Partner Content

Why rock-solid MSPs services require unified infrastructure monitoring
Promoted Content
Why rock-solid MSPs services require unified infrastructure monitoring
Is business nbn Enterprise Ethernet the future of business connectivity for MSPs?
Promoted Content
Is business nbn Enterprise Ethernet the future of business connectivity for MSPs?
Tradewinds has turned unified communications into an easier upsell
Promoted Content
Tradewinds has turned unified communications into an easier upsell
Microsoft, Yealink and Alloy’s roadshows fire up the Australian channel
Promoted Content
Microsoft, Yealink and Alloy’s roadshows fire up the Australian channel
How to prepare for the increasing demand for cloud-ready partners
Promoted Content
How to prepare for the increasing demand for cloud-ready partners

Sponsored Whitepapers

How vulnerability scans identify & protect against cyberthreats before criminals locate them
How vulnerability scans identify & protect against cyberthreats before criminals locate them
Monitoring & automation: A primer for MSPs
Monitoring & automation: A primer for MSPs
Endpoint Detection and Response
Endpoint Detection and Response
How to put your infrastructure into overdrive
How to put your infrastructure into overdrive
MSPs: Stack your solutions
MSPs: Stack your solutions
By Tom Brewster
Sep 24 2010
10:47AM
0 Comments

Related Articles

  • Don't miss Australia’s premiere IoT Conference on 9th June
  • 5 essential digital transformation ideas
  • Top 5 Benefits of Managed IT Services
  • Gravatar profile add-on leaks data on millions of users
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

State of the MSP

State of the MSP

VMware channel chief Sandy Hogan to depart

VMware channel chief Sandy Hogan to depart

Broadcom to invest in VMware partners, sales, engineers

Broadcom to invest in VMware partners, sales, engineers

Minister's office was warned of concerns about Entrepreneurs Program

Minister's office was warned of concerns about Entrepreneurs Program

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.