What's new

Confirmed: US and Israel created Stuxnet, lost control of it

Agent_47

FULL MEMBER
Joined
Jul 20, 2011
Messages
1,757
Reaction score
1
Country
India
Location
India
Confirmed: US and Israel created Stuxnet, lost control of it

In 2011, the US government rolled out its "International Strategy for Cyberspace," which reminded us that "interconnected networks link nations more closely, so an attack on one nation’s networks may have impact far beyond its borders." An in-depth report today from the New York Times confirms the truth of that statement as it finally lays bare the history and development of the Stuxnet virus—and how it accidentally escaped from the Iranian nuclear facility that was its target.

The article is adapted from journalist David Sanger's forthcoming book, Confront and Conceal: Obama’s Secret Wars and Surprising Use of American Power, and it confirms that both the US and Israeli governments developed and deployed Stuxnet. The goal of the worm was to break Iranian nuclear centrifuge equipment by issuing specific commands to the industrial control hardware responsible for their spin rate. By doing so, both governments hoped to set back the Iranian research program—and the US hoped to keep Israel from launching a pre-emptive military attack.

The code was only supposed to work within Iran's Natanz refining facility, which was air-gapped from outside networks and thus difficult to penetrate. But computers and memory cards could be carried between the public Internet and the private Natanz network, and a preliminary bit of "beacon" code was used to map out all the network connections within the plant and report them back to the NSA.

That program, first authorized by George W. Bush, worked well enough to provide a digital map of Natanz and its industrial control hardware. Soon, US national labs were testing different bits of the plan to sabotage Natanz (apparently without knowing what the work was for) using similar centrifuges that had come from Libya's Qadaffi regime. When the coders found the right sets of commands to literally shake the centrifuges apart, they knew that Stuxnet could work.

When ready, Stuxnet was introduced to Natanz, perhaps by a double agent.

Getting the worm into Natanz, however, was no easy trick. The United States and Israel would have to rely on engineers, maintenance workers and others — both spies and unwitting accomplices — with physical access to the plant. “That was our holy grail,” one of the architects of the plan said. “It turns out there is always an idiot around who doesn’t think much about the thumb drive in their hand.”

In fact, thumb drives turned out to be critical in spreading the first variants of the computer worm; later, more sophisticated methods were developed to deliver the malicious code.
When Barack Obama came to office, he continued the program--called "Olympic Games"—which unpredictably disabled bits of the Natanz plant even as it told controllers that everything was normal. But in 2010, Stuxnet escaped Natanz, probably on someone's laptop; once connected to the outside Internet, it did what it was designed not to do: spread in public. The blame game began about who had slipped up in the coding.

“We think there was a modification done by the Israelis,” one of the briefers told the president, “and we don’t know if we were part of that activity.”

Mr. Obama, according to officials in the room, asked a series of questions, fearful that the code could do damage outside the plant. The answers came back in hedged terms. Mr. Biden fumed. “It’s got to be the Israelis,” he said. “They went too far.”
Once released more widely, the Stuxnet code was found and then disassembled by security researchers.

Please don't follow our example

As the International Strategy for Cyberspace notes, these sorts of electronic attacks are serious business. The US in fact reserves the right to use even military force to respond to similar attacks. "All states possess an inherent right to self-defense, and we recognize that certain hostile acts conducted through cyberspace could compel actions under the commitments we have with our military treaty partners," says the report. "We reserve the right to use all necessary means—diplomatic, informational, military, and economic—as appropriate and consistent with applicable international law."

Yet the US had just gone on the cyber-attack, and everyone knew it. Speculation has long swirled around government-backed hackers from nations like China and Russia, especially, who have been suspected of involvement in espionage, industrial trade secret theft, and much else. Would something like Stuxnet damage US credibility when it complained about such attacks? (China has long adopted the "you do it too!" defense on Internet issues, especially when it comes to censoring and filtering of Internet content.)

Obama was at least aware of the the likely answer—yes—but pressed ahead, even accelerating the Olympic Games program.

[Obama] repeatedly expressed concerns that any American acknowledgment that it was using cyberweapons — even under the most careful and limited circumstances — could enable other countries, terrorists or hackers to justify their own attacks. “We discussed the irony, more than once,” one of his aides said.
Stuxnet is old news by now. Even the newly discovered "Flame" malware was developed some time ago. While details about these two targeted attack packages are finally emerging, the next generation of attack tools has no doubt been developed and likely deployed.

Confirmed: US and Israel created Stuxnet, lost control of it | Ars Technica

Obama Order Sped Up Wave of Cyberattacks Against Iran




Mr. Obama decided to accelerate the attacks — begun in the Bush administration and code-named Olympic Games — even after an element of the program accidentally became public in the summer of 2010 because of a programming error that allowed it to escape Iran’s Natanz plant and sent it around the world on the Internet. Computer security experts who began studying the worm, which had been developed by the United States and Israel, gave it a name: Stuxnet.

At a tense meeting in the White House Situation Room within days of the worm’s “escape,” Mr. Obama, Vice President Joseph R. Biden Jr. and the director of the Central Intelligence Agency at the time, Leon E. Panetta, considered whether America’s most ambitious attempt to slow the progress of Iran’s nuclear efforts had been fatally compromised.

“Should we shut this thing down?” Mr. Obama asked, according to members of the president’s national security team who were in the room.

Told it was unclear how much the Iranians knew about the code, and offered evidence that it was still causing havoc, Mr. Obama decided that the cyberattacks should proceed. In the following weeks, the Natanz plant was hit by a newer version of the computer worm, and then another after that. The last of that series of attacks, a few weeks after Stuxnet was detected around the world, temporarily took out nearly 1,000 of the 5,000 centrifuges Iran had spinning at the time to purify uranium.

This account of the American and Israeli effort to undermine the Iranian nuclear program is based on interviews over the past 18 months with current and former American, European and Israeli officials involved in the program, as well as a range of outside experts. None would allow their names to be used because the effort remains highly classified, and parts of it continue to this day.

These officials gave differing assessments of how successful the sabotage program was in slowing Iran’s progress toward developing the ability to build nuclear weapons. Internal Obama administration estimates say the effort was set back by 18 months to two years, but some experts inside and outside the government are more skeptical, noting that Iran’s enrichment levels have steadily recovered, giving the country enough fuel today for five or more weapons, with additional enrichment.

Whether Iran is still trying to design and build a weapon is in dispute. The most recent United States intelligence estimate concludes that Iran suspended major parts of its weaponization effort after 2003, though there is evidence that some remnants of it continue.

Iran initially denied that its enrichment facilities had been hit by Stuxnet, then said it had found the worm and contained it. Last year, the nation announced that it had begun its own military cyberunit, and Brig. Gen. Gholamreza Jalali, the head of Iran’s Passive Defense Organization, said that the Iranian military was prepared “to fight our enemies” in “cyberspace and Internet warfare.” But there has been scant evidence that it has begun to strike back.

The United States government only recently acknowledged developing cyberweapons, and it has never admitted using them. There have been reports of one-time attacks against personal computers used by members of Al Qaeda, and of contemplated attacks against the computers that run air defense systems, including during the NATO-led air attack on Libya last year. But Olympic Games was of an entirely different type and sophistication.

It appears to be the first time the United States has repeatedly used cyberweapons to cripple another country’s infrastructure, achieving, with computer code, what until then could be accomplished only by bombing a country or sending in agents to plant explosives. The code itself is 50 times as big as the typical computer worm, Carey Nachenberg, a vice president of Symantec, one of the many groups that have dissected the code, said at a symposium at Stanford University in April. Those forensic investigations into the inner workings of the code, while picking apart how it worked, came to no conclusions about who was responsible.

A similar process is now under way to figure out the origins of another cyberweapon called Flame that was recently discovered to have attacked the computers of Iranian officials, sweeping up information from those machines. But the computer code appears to be at least five years old, and American officials say that it was not part of Olympic Games. They have declined to say whether the United States was responsible for the Flame attack.

Mr. Obama, according to participants in the many Situation Room meetings on Olympic Games, was acutely aware that with every attack he was pushing the United States into new territory, much as his predecessors had with the first use of atomic weapons in the 1940s, of intercontinental missiles in the 1950s and of drones in the past decade. He repeatedly expressed concerns that any American acknowledgment that it was using cyberweapons — even under the most careful and limited circumstances — could enable other countries, terrorists or hackers to justify their own attacks.

Full story:http://www.nytimes.com/2012/06/01/w...d-wave-of-cyberattacks-against-iran.html?_r=1
 
.
I am not even interested in the outcome of this virus ....
I am just interested on USA's own opinion and public sentiment regarding the doings of their government.

Must the US gov be found doing some thing some where in the world always?
 
.
Cyber warfare is scary business. Computer technologically is developing at a crazy fast speed. Nanobot technology is multiplying by the year.

Mr. Obama, according to participants in the many Situation Room meetings on Olympic Games, was acutely aware that with every attack he was pushing the United States into new territory, much as his predecessors had with the first use of atomic weapons in the 1940s, of intercontinental missiles in the 1950s and of drones in the past decade. He repeatedly expressed concerns that any American acknowledgment that it was using cyberweapons —even under the most careful and limited circumstances —could enable other countries, terrorists or hackers to justify their own attacks.

Shame on us, but I'm not surprised, just disappointed.
 
.
Imagine what else the Americans have lurking in the world's computers.

Flame, the recently discovered malware, was developed in 2007 and managed to evade detection for over 5 years.

What's worrying is that the flame malware can record stuff like audio, screenshots, keyboard activity, network comm, and even IM chats/skype convos. On top of that, it's even more complex than stuxnet.

Meanwhile in the US, the NSA is building a multi-billion dollar spy center that will aggregate, decrypt and analyze all forms of communication.
 
. .
Imagine what else the Americans have lurking in the world's computers.

Flame, the recently discovered malware, was developed in 2007 and managed to evade detection for over 5 years.

What's worrying is that the flame malware can record stuff like audio, screenshots, keyboard activity, network comm, and even IM chats/skype convos. On top of that, it's even more complex than stuxnet.

Meanwhile in the US, the NSA is building a multi-billion dollar spy center that will aggregate, decrypt and analyze all forms of communication.

I am not at all shocked anyone with basic IT security skills can understand all of this is possible just like other govts so is the Us in equal threat

but the best part is more then flame actually causing damage to any Military targets its a psychological weapon.

I don't think the Iranians are so stupid to keep there N/W open to the grid or for tat in the same N/W group.

Windows OS is the biggest spyware,malware...... in the history

Flame might have done more of a damage to the civilian group.
 
.
If this is true, I am utterly supportive of these efforts and the methods that were taken.

No loss of life, not even indirectly, just a dead nuclear reactor and a nuclear program set back.

I fervently hope there are more applications of cyberwarfare against Iran's clandestine unmonitored nuclear facilities resulting in their destruction with no loss of life.
 
.
Yes!! Imagine! And be very afraid. You are either with us or with the terrorists. Your choice.

Today US labels whoever which is not in its favour either "terrorist" or "sponsor of terrorism." US itself is sponsor of terrorism
Jundallah - Wikipedia, the free encyclopedia
and performs terror (Iranian scientists)

So your beloved govt doesn't give a damn for even what it pretend it is fighting for. Not just this "war on terror" story; in everything. You are blah-blah-ing about "freedom" while you are supporting dictators (28 Mordad coup in Iran, recent supports for Bahraini dictators against people, you name it.) You pretend you are against WMD while at the same time used it against Iranian innocents (last paragraph) and now about nukes: israel-nuclear-v-iran-cartoon1.jpg
 
.
If this is true, I am utterly supportive of these efforts and the methods that were taken.

No loss of life, not even indirectly, just a dead nuclear reactor and a nuclear program set back.

I fervently hope there are more applications of cyberwarfare against Iran's clandestine unmonitored nuclear facilities resulting in their destruction with no loss of life.

So if we target U.S infrastructures with cyber attacks,would you still say the same?
Of course no one dies,but U.S can become paralyzed for over a month with a huge cyber attack.
 
.
If this is true, I am utterly supportive of these efforts and the methods that were taken.

No loss of life, not even indirectly, just a dead nuclear reactor and a nuclear program set back.

I fervently hope there are more applications of cyberwarfare against Iran's clandestine unmonitored nuclear facilities resulting in their destruction with no loss of life.


well since the us has stated through its own actions that it is ok for cyberwarfare and cyber espionage, i am wondering if you will be ok with it when a "cyber application" is made that forces all USA nuclear reactors to go into meltdown...

will you be happy then? since the usa has officially said cyber warfare is ok?
 
.
Leaving aside Stuxnet and focusing on Flame which was a blatant invasion of civilian privacy, I wonder what long term effect it will have on the internet. Flame was targeted at the Middle East. What happens if someone discovers a similar virus which is widespread in Western countries?
 
.
developereo.. i think there is a good chance these cyber wars will harm the general public - viruses and trojans and other assorted stuff, might be originally aimed at something specific.. but it will spread and be manipulated and changed etc................they will consider it as collateral damage ... but, i guess iran could literally say the usa and israel have declared war on them and attacked them without provocation, or without a UN mandate, as the usa has previously stated that any cyber attack from a government would be considered an act of war
 
.
So if we target U.S infrastructures with cyber attacks,would you still say the same?
Of course no one dies,but U.S can become paralyzed for over a month with a huge cyber attack.
Prepare for a huge cyber attack on US and Israel in the coming months ;)
 
. .
developereo.. i think there is a good chance these cyber wars will harm the general public - viruses and trojans and other assorted stuff, might be originally aimed at something specific.. but it will spread and be manipulated and changed etc................they will consider it as collateral damage ... but, i guess iran could literally say the usa and israel have declared war on them and attacked them without provocation, or without a UN mandate, as the usa has previously stated that any cyber attack from a government would be considered an act of war

The issue is more about psychology and loss of confidence. If there is a public perception that the US government is making viruses to spy on people and that anti-virus companies are somehow complicit in covering up, it will affect public confidence.

It doesn't matter that the virus is intended for enemy countries. What is used 'there' today may well be used 'here' tomorrow, all in the name of 'national security'. The NSA already monitors various communications.
 
.
Back
Top Bottom