Stuxnet Worm
Stuxnet is a computer worm which was discovered in June 2010. It was a powerful and malicious computer worm. Rumors are this computer worm was developed by the US and Israel agencies to infiltrate Iran’s nuclear facilities. This computer worm was specifically written to take over programmable industrial control systems. Stuxnet was the first computer worm/virus to cause physical destruction of infected devices. It exploited Windows zero-day vulnerabilities to infect target systems and spread to other systems.
Working of Stuxnet Worm
Stuxnet is a highly sophisticated and intrusive piece of malware. However, It is carefully created to infect only targets with specific configurations and cause minimum damage to other devices. Stuxnet was transmitted via USB sticks carried by agents inside the facilities.
Stuxnet is a complex malware. It has a code for man-in-the-middle (MITM) attack that fakes sensor signals, so that the targeted system won’t shutdown due to the abnormal behavior. The three systemic layers which Stuxnet Worm targets are:
- Windows OS
- Siemens PCS 7, WinCC and STEP7 industrial software applications
- Siemens S7 programmable logic controller
Stuxnet Worm infiltrated Windows systems by exploiting various zero-day vulnerabilities such as Remote Code Execution (RCE). This malware accesses both user and kernel levels. Its device drivers are signed by two public certificates, so it can access kernel drivers without user’s knowledge and remains undetected for a long time.
After penetrating Windows systems, Stuxnet Worm infects files belonging to Siemens industrial software applications and disrupts their communications. It also modifies the code on Programmable Logic Controllers (PLC) devices.
Stuxnet installs malware codes in PLC monitors. Then it constantly changes the system’s frequency and affects the operation of motors by changing their rotational speed. Stuxnet also contains a rootkit that hides the worm from monitoring systems.
Legacy of Stuxnet Worm
The Stuxnet Worm attack expired on June 12 and Siemens issued fixes for its PLC softwares. But the legacy of Stuxnet lives on in other malware attacks based on the original Stuxnet code. These “Sons of Stuxnet” include:
- Duqu (2011)
- Flame (2012)
- Havex (2013)
- Industroyer (2016)
- Triton (2017)
Malware Details
Common Name: Stuxnet
Technical Name: As Stuxnet
By Microsoft
Worm: Win32/Stuxnet.[Letter]
TrojanDropper: Win32/Stuxnet
By Kaspersky
Worm.Win32.Stuxnet
By Symantec
W32.Stuxnet
W32.Stuxnet!Ink
Classification: Computer Worm
Type: Dropper
Targeted OS: Windows
- Windows 2000
- Windows XP
- Windows 2003
- Windows Vista
- Windows Server 2008
- Windows 7
- Windows Server 2008 R2