Feeds

Stuxnet code leak to cause CYBER-APOCALYPSE NOW!

Get a grip, Sky News

Internet Security Threat Report 2014

Source code for the sophisticated Stuxnet worm has reportedly made it onto underground forums where it is been offered up for sale at some unspecified price.

This not entirely unexpected development, first reported by Sky News, has prompted the satellite TV channel to get for broke with a loosely substantiated story sensationally headlined "Super Virus A Target For Cyber Terrorists". Sky quotes unnamed senior IT security sources sources to report the "virus is in the hands of bad guys".

The malware could now be adapted and used to shut down power stations, "the transport network across the UK" and the 999 system, according to Will Gilpin, an IT security consultant to the UK government. Gilpin goes on to conclude, at the end of an accompanying video report, that we're a generation behind and have already lost the war in cyberspace.

These dire warnings of doom are nothing more than alarmist claptrap, according to Paul Ducklin of Sophos, who criticises the report for stating assumptions as fact as well as for sensationalism.

Ducklin is far more worried about the very real problem posed by cybercrooks raiding bank accounts and subverting payment systems, a concern we wholeheartedly share.

"The problem with inaccurate, inflammatory and irresponsible stories about Stuxnet - good though they may be for page impressions and video views - is that they make cybercriminality sound like a second-rate problem when it is positioned against a news backdrop alleging cyberwar," Ducklin writes.

Stuxnet is highly sophisticated worm that selectively targets industrial control systems from Siemens. The most well-publicised incident of infection was at the Bushehr nuclear power plant in Iran but it's far from clear if the worm sabotaged systems carrying out uranium enrichment at Natanz or at Iran's controversial Bushehr nuclear power plant, which has been subject to delays. It's even less clear who developed the malware.

Whoever created the code used four Windows zero-day vulnerabilities, now exposed, and must have done a great deal of testing on industrial control systems. Adapting the worm for another target would take a almost equivalent level of expertise.

The idea that "cyberterrorists" are poised to unleash variants of this malware at 999 systems or the UK transport network belongs in the same category as claims that Iraq might be able to deploy biological weapons within 45 minutes in discredited documents published by the UK government prior to the start of the disastrous invasion of the country.

It really is that bad.

Stuxnet is a complex threat, and the Iranian nuclear angle certainly adds spice, so it's a bit easy for the general media to get a bit carried away. For a very good – non-sensationalist – info on the Stuxnet worm we can offer no better resource than F-Secure's well-written redux here. ®

Beginner's guide to SSL certificates

More from The Register

next story
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.