Mar 6 2012
STUXNET Computer Code Shuts Down Iran Nuclear Power Plant

STUXNET Michael Hayden, former head of national security agency. Knows much more than he can talk about. On 60 Minutes.

Cyber Weapons

Is this acceptable?

June 2010, first detected.
Software glitch
Computer security Expers
William Immurku – with Symantec
Spread by USB Thumb Drives

Tens of thousands of lines of code.

was not trying to steal passwords,

It was looking for industrial
Siemens F7300 Programmable Logic Controller (PLC) most critical, from water treatment, nuclear power plants, oil plants.

Grey box that runs factory floors

5 man Immurku team.

Denmark and Malaysia, immurku was able to monitor

7% of infections occured in Iran.

Ralph Langer, industry security specialist
FC6604 STUXNET
Did not attack all computers, sequence of checks, looking for a target, through probing.

It was looking specific factory floor, iranian variable speed motors, critical to nuclear reaction.

Fall of 2010, top secret, was the target
Corrupted
Alter speed of centrifuge, sabatoge by software
spin at speeds they are not meant to speed at.
it was able to prevent operators from seeing that anything bad was happening.

November 2010, STUXNET had already accomplished
IAEA – Iran removed centrifuges, did STUXNET succeed, apparently it did. Who was behind it?
Very large operation, politically motivated.
Intellegence agency, reverse
Knew the plan better than the people that built the plant.

Michael Hayden left the CIA in 2009.

The attack sets back the nuclear power plant by years.

If the attack had not been detected…. the damage to the program could have been going on for years… It was never meant to be seen.

It was supposed to be kept secret, do the damage and disappear.

what about critical

Sean River head of homeland security
Cyber criminals. download code to STUXNET is available for free to decode and code

STUXNET could not be undone, and put back, unintended consequences are

Abstract theory has become a reality.

Couple millions and you could buy your own attack, look on the internet and you could hire the coders to build the code.

The nation has been warned. These attacks are a very distinct possibility in the future.

Share

Written by

View all posts by:

Categories: Uncategorized