Добавил:
Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Lessons In Industrial Instrumentation-14.pdf
Скачиваний:
9
Добавлен:
25.06.2023
Размер:
2.87 Mб
Скачать

33.1. STUXNET

2723

33.1.5Stuxnet version 0.5

Multiple versions of the Stuxnet virus were aimed at the Natanz facility, at least two significantly di erent “major” versions which are publicly known at the time of this writing (2016). The first major Stuxnet version, developed as early as November of 2005 and labeled as version 0.5 by the Symantec Corporation, di ered from later versions both in its means of delivery (the dropper portion of the virus code) and its means of attack (the payload portion of the virus code). Later versions of Stuxnet (compiled in 2009-2010 and dubbed versions 1.x by Symantec) employed a much more sophisticated “dropper” and a payload designed to a ect a completely di erent portion of the Iranian centrifuge control system.

A summary of Stuxnet version 0.5 appears here:

Infection point: The infection begins with files written to a removable drive (e.g. USB flash drive), automatically run by the Windows operating system upon connection to a personal computer.

Dropper vector: Stuxnet searches for and infects any Siemens Step 7 PLC project archives found on the personal computer.

Payload target: Siemens S7-417 programmable logic controllers (PLCs) implementing the Cascade Protection System for isolation and overpressure control of centrifuges.

Payload vector: Install a DLL (Dynamically Linked Library) file in the Siemens Step 7 software library collection designed to alter any Step 7 programming code downloaded to a PLC, inserting attack code in the infected PLCs.

Payload task: Shut o isolation valves and mis-calibrate the pressure sensors to cause mild over-pressuring of the centrifuges.

Goal: Increase stress on operating centrifuges, leading to premature failure. Avoid catastrophic cascade failure, which would raise suspicion.

Stop date: July 4, 2009.

The “dropper” portion of Stuxnet version 0.5 exploited a vulnerability in the Siemens “Step 7” PLC programming software which runs on Windows-based personal computers, but did not exploit any vulnerabilities within the Windows operating system itself. In fact, this early version of Stuxnet lacked the ability to self-propagate over the internet, and had to be installed on a personal computer running the Siemens Step 7 software. The most popular hypothesis to date is that the infection happened via a USB flash drive, or “memory stick” used to store digital data.

The “payload” portion of Stuxnet version 0.5 was incredibly sophisticated by comparison.