Case Studies

Report: Stuxnet Worm Attacks Iran, Who is Behind It?
BY CHLOE ALBANESIUS , LARRY SELTZER SEPTEMBER 27, 2010

            The Stuxnet worm has already infected 30,000 IP addresses in Iran and is still mutating, according to Monday press reports. "The attack is still ongoing and new versions of this virus are spreading," Hamid Alipour, deputy head of Iran's Information Technology Company, was quoted as saying by IRNA, Iran's official news agency, AFP reported.
Stuxnet, a joint U.S.-Israel project, is known for reportedly destroying roughly a fifth of Iran’s nuclear centrifuges by causing them to spin out of control. Stuxnet was created for Siemens supervisory control and data acquisition (SCADA) systems, which control water supplies, oil rigs, power plants, and other industrial facilities. Iranian authorities have denied that the country's Bushehr nuclear plant was targeted, AFP said, though Computerworld reported that while some computers at the facility were infected, none were in control of crucial control systems.
Stuxnet appears to be more than just another malware attack or another targeted attack. Many believe that it is a government-sponsored attack against Iran's nuclear facilities. Stuxnet first came to our attention as the first attack using Microsoft Windows Shortcut 'LNK/PIF' vulnerability. German security firm Langner called it the "hack of the century." Roel Schouwenberg of Kaspersky also said it was groundbreaking.

Effect of the Attack: Minor
Effect is defined as an impact of a cyber crime attack, that could be considered anywhere from major to negligible. However, in this case the effect of this attack is not so major and is recoverable and minor.
Moreover, the Stuxnet virus did cause the destruction of the Iran’s nuclear centrifuges by causing them to go out of control. The control room of the Iran’s nuclear plant had no idea about this situation since the virus Stuxnet made everything appear normal.
The aim of the virus was not to destroy the centrifuge system, but to decrease the lifetime of the Iran’s centrifuges and making the Iranian’s feel that the most advances system is out of their understanding. The attack did make the organization realize the importance of the cyber security and from the incident they decided to solidify their security in cyber world as well as assigning a significant budget for it.(Fiza Mirza)
                                                                                
Vulnerability: Shortcut LNK/PIF.
                          Vulnerability is weakness in a system. Hacker can exploit the vulnerability to hack the system or gain control. These vulnerabilities can be caused by improper configuration or faulty codes or error in design of the system.
Stuxnet was a worm which could replicate itself and spread to the whole system it does not require human interaction. Microsoft windows is prone to vulnerability of handling LNK PIF files. An attacker may exploit this issue to execute arbitrary code.
 The attacker must entice a victim to view an especially crafted shortcut. The Stuxnet first attacked Microsoft windows machines Shortcut LNK/PIF.  Then it sought out Siemens Step7 software which is also windows based and used to program industrial control system that operate equipment, such as centrifuges and finally it compromised the programmable logic controllers.( Khadija tul Qubra)

Automation Level: Automatic
                                        Automation level can be defined as the level of input the user is doing in the attack. It can be classified in three types. First type is manual in which the attacker will need to select manually the target and the methodology. The second type is Automatic. It requires minimum input from the attacker. The combination of both types is called Semi-automatic.  
In this case, the attacker is an organized criminal group who are located in a foreign location. They used tools to reach their target. In addition, the system required no input from the attacker. The attack was executed automatically as they did not use any manual way to do their attack. Hence, the automation level in this case is automatic.
  “Stuxnet, a joint U.S.-Israel project, is known for reportedly destroying roughly a fifth of Iran’s nuclear centrifuges by causing them to spin out of control.”  Large numbers were destroyed which prove that this attack was automated. (Shaima Albugami)

Scope:  Government Network
                                  The scope is refers to the size and kind of substance that is focused on. The scope is contain three types which are: So, in this case study we found that the scope is government network because the attack it was between USA and Iran. 
USA want to attack the software for Iran. And we know all these information from this paragraph:A joint U.S.-Israel project, is known for reportedly destroying roughly a fifth of Iran’s nuclear centrifuges by causing them to spin out of control.(shahad maddah) 

Target:  Software, Windows Microsoft
                                  Computers can be the target of a criminal activity, a storage place for data about a criminal activity and/or the actual tool used to commit a crime (planning criminal activity). One of the most publicized crimes is targeting computers software.

In this case the target was attack (Software, Windows Microsoft). The software attack surface is the complete profile of all functions in any code running in a given system that are available to an unauthenticated user.

Stuxnet attacked Windows systems using an unprecedented four zero-day attacks. It is initially spread using infected removable drives such as USB flash drives, and then uses other exploits and techniques such as peer-to-peer RPC to infect and update other computers inside private networks that are not directly connected to the Internet.( by Wed Almarhabi)

For more information on this case study click here.
For countermeasure and protection from this attack click here
For other Case-studies click on the links below:


 

Sources:
1.     http://www.pcmag.com/article2/0,2817,2369745,00.asp