12.07.2015 Views

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

STUXNET INVALIDATES SEVERAL SECURITY ASSUMPTIONS233nature of this type of exploit that it has been previously undetected, they are also unidentifiedby existing antivirus software. As a point of reference, “Operation Aurora” (Chapter 6) relieson one zero-day vulnerability. The use of two zero-day vulnerabilities would be unprecedented.62 Stuxnet contains four zero-day vulnerabilities for the Microsoft Windows operatingsystem and an additional one for the Siemens software. Two of the Windows vulnerabilitiesused in Stuxnet deal with privilege escalation. These allow the worm illegitimate root oradministra<strong>to</strong>r-level access <strong>to</strong> the infected system. Further, by using this root kit methodology<strong>to</strong> obtain this level of access, the worm avoids detection by most antivirus software. 63 Theother two deal with the propagation of the worm either through a memory stick or througha local network. At the time of this writing, self-propagation is less common in malware as it isoften difficult <strong>to</strong> control. For example, consider a “botnet”—a large number of computersinfected with malware and controlled by a “command and control” server which is not legitimatelyaffiliated with the infected machines. 64 With a botnet, propagation occurs primarilythrough spam emails and malicious Web sites—self-propagation methods are very limited. 65By contrast, it seems as though Stuxnet primarily relies on self-propagation rather than theother methods typically affiliated with botnets.STUXNET INVALIDATES SEVERAL SECURITY ASSUMPTIONSOur final aspect of the Stuxnet as revolution of military affairs (RMA) is that it invalidatesseveral security assumptions. The first such assumption is that isolated systems are moresecure than interconnected setups. As SCADA systems, by definition, control mission criticalmachinery, many administra<strong>to</strong>rs do not connect these computers <strong>to</strong> a network—attempting <strong>to</strong> achieve security by isolation. As a result, file transfer <strong>to</strong> such machines isconducted by removable media. This is often referred <strong>to</strong> as an “air-gap” system or“sneakernet.” The designers of Stuxnet exploited this assumption by enabling the worm<strong>to</strong> spread through memory sticks. Once the stick is infected, the Stuxnet software runs itselfon the as target-identified computers, which subsequently use the infected drive. The infectioncommences when the user simply clicks on the icon for the memory stick in Windows.This is a direct application of one of the zero-day vulnerabilities that Stuxnet leverages.Another key security assumption Stuxnet invalidates is the trust relationship set in placeby digitally signed certificates. In order <strong>to</strong> provide more stability, modern operating systems,including Microsoft Windows, limit a computer program’s access <strong>to</strong> system components.A normal program requests systems calls <strong>to</strong> hardware via driver software. As such isthecase,thedriversoftwarehasmoreaccess<strong>to</strong>lower-levelsystemcomponentsthanotherprograms. To avoid the easy creation of malicious driver software, Microsoft Windowsrelies on digitally signed certificates. In order <strong>to</strong> prevent detection by antivirus software,Stuxnet uses legitimate digitally signed certificates. This is another aspect of the malwarethat has not been previously observed. Early versions of Stuxnet used certificates by RealtekSemiconduc<strong>to</strong>r Systems—later versions used certificates from JMicron Technology Corp.The use of these certificates gives the worm the appearance of legitimate software <strong>to</strong>Microsoft Windows. Security experts at ESET note that both companies were based ou<strong>to</strong>f Taiwan and suspect that the certificates were s<strong>to</strong>len. Further, they believe it was most

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!