AGL 24.40 Increased By ▲ 0.15 (0.62%)
AIRLINK 89.45 Decreased By ▼ -1.65 (-1.81%)
BOP 5.67 Increased By ▲ 0.09 (1.61%)
CNERGY 3.95 Decreased By ▼ -0.05 (-1.25%)
DCL 8.70 Decreased By ▼ -0.22 (-2.47%)
DFML 42.09 Decreased By ▼ -0.21 (-0.5%)
DGKC 89.35 Decreased By ▼ -1.45 (-1.6%)
FCCL 22.44 Decreased By ▼ -0.41 (-1.79%)
FFBL 36.35 Decreased By ▼ -0.45 (-1.22%)
FFL 9.29 Decreased By ▼ -0.11 (-1.17%)
HUBC 163.70 Decreased By ▼ -1.10 (-0.67%)
HUMNL 10.80 Increased By ▲ 0.18 (1.69%)
KEL 4.77 Increased By ▲ 0.05 (1.06%)
KOSM 4.12 Decreased By ▼ -0.02 (-0.48%)
MLCF 37.50 Decreased By ▼ -0.49 (-1.29%)
NBP 46.92 Increased By ▲ 3.67 (8.49%)
OGDC 132.90 Decreased By ▼ -2.44 (-1.8%)
PAEL 26.15 Decreased By ▼ -0.30 (-1.13%)
PIBTL 6.20 Increased By ▲ 0.07 (1.14%)
PPL 122.20 Decreased By ▼ -1.00 (-0.81%)
PRL 24.35 Increased By ▲ 0.14 (0.58%)
PTC 12.47 Increased By ▲ 0.05 (0.4%)
SEARL 58.10 Decreased By ▼ -1.10 (-1.86%)
TELE 7.92 Decreased By ▼ -0.11 (-1.37%)
TOMCL 35.70 Decreased By ▼ -0.45 (-1.24%)
TPLP 8.95 Decreased By ▼ -0.13 (-1.43%)
TREET 15.90 Decreased By ▼ -0.28 (-1.73%)
TRG 60.90 Decreased By ▼ -0.20 (-0.33%)
UNITY 31.50 Decreased By ▼ -0.25 (-0.79%)
WTL 1.26 Decreased By ▼ -0.03 (-2.33%)
BR100 8,496 Decreased By -0.5 (-0.01%)
BR30 27,202 Decreased By -87.8 (-0.32%)
KSE100 80,213 Decreased By -70 (-0.09%)
KSE30 25,712 Decreased By -80 (-0.31%)

The Stuxnet worm that infiltrated Iran's nuclear facilities poses a threat to critical industries world-wide such as water, power and chemical plants, cybersecurity experts warned on November 17.
Sean McGurk, the acting director of the Department of Homeland Security's National Cybersecurity and Communications Integration Center (NCCIC), described Stuxnet in testimony before a US Senate committee as a "game-changer."
Stuxnet, which was detected in July, has "significantly changed the landscape of targeted cyberattacks," McGurk told the Senate Committee on Homeland Security and Governmental Affairs. "For us, to use a very overused term, it's a game-changer," he said.
Stuxnet targets computer control systems made by German industrial giant Siemens commonly used to manage water supplies, oil rigs, power plants and other critical infrastructure.
Most Stuxnet infections have been discovered in Iran, giving rise to speculation it was intended to sabotage nuclear facilities there, especially the Russian-built atomic power plant in the southern city of Bushehr.
Computer security firm Symantec said last week that Stuxnet may have been specifically designed to disrupt the motors that power gas centrifuges used to enrich uranium.
Dean Turner, director of Symantec's Global Intelligence Network, told the Senate panel that while 60 percent of the Stuxnet infections detected were in Iran it should be seen as "a wake-up call to critical infrastructure systems around the world."
"This is the first publicly known threat to target industrial control systems and grants hackers vital control of critical infrastructures such as power plants, dams and chemical facilities," Turner said. Stuxnet was so complex that only a "select few attackers" could develop a similar threat but it highlights that "direct-attacks to control critical infrastructure are possible and not necessarily spy novel fictions," he said.
"The real-world implications of Stuxnet are beyond any threat we have seen in the past," Turner warned.
The New York Times reported in September that Stuxnet code includes a reference to the Book of Esther, the Old Testament story in which the Jews pre-empt a Persian plot to destroy them, and is a possible clue of Israeli involvement.
McGurk, the US cybersecurity official, declined to speculate about Stuxnet's origins or objectives but said US analysis "indicates that a specific process was likely targeted."
"While we do not know which process was the intended target, it is important to note that the combination of Windows operating software and Siemens hardware can be used in control systems across critical infrastructure sectors - from automobile assembly lines to mixing baby formula to processing chemicals," he said.
"The concern for the future of Stuxnet is that the underlying code could be adapted to target a broader range of control systems in any number of critical infrastructure sectors," McGurk said.
"These systems are used to operate physical processes that produce the goods and services that we rely upon, such as electricity, drinking water, and manufacturing," he said.
"Although each of the critical infrastructure industries, from energy though water treatment, is vastly different, they all have one thing in common: they are dependent on control systems to monitor, control, and safeguard their processes," the US cybersecurity official said.
McGurk warned that "a successful cyberattack on a control system could potentially result in physical damage, loss of life, and cascading effects that could disrupt services."
He explained that with Stuxnet, "I don't have to break into the front door and actually steal the formula or the intellectual property of what you're manufacturing.
"I can actually go the devices themselves, read the settings and reverse engineer the formula for whatever the process is that's being manufactured," McGurk said. "In addition, I can make modifications to the physical environment so that you would be unaware of those changes being made.
"In other words, this code can automatically enter a system, steal the formula for the product you are manufacturing, alter the ingredients being mixed in your product, and indicate to the operator and your anti-virus software that everything is functioning as expected," he said.

Copyright Agence France-Presse, 2010

Comments

Comments are closed.