EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

09.24.10

Who Needs Windows Back Doors When It’s So Insecure?

Posted in Asia, Microsoft, Security, Windows at 3:11 pm by Dr. Roy Schestowitz

Mohammad Mosaddeq

Summary: Stuxnet is allegedly part of a plan to infect computer systems in Iran for political reasons, according to an increasing body of evidence

SO, it’s starting to look like Stuxnet [1, 2, 3, 4, 5, 6, 7, 8, 9, 10] was part of a plot to derail Iran’s nuclear programme [1, 2]. Stuxnet makes use of zero-day Windows vulnerabilities rather than back doors. Will governments finally realise that foreign governments can use Windows against them? Software freedom is essential to one’s autonomy.

The debate about Stuxnet and Iran is only starting. So far we’ve come across the following reports (there are many more):

i. Advanced Computer Worm Was Specifically Designed to Attack Iranian Nuclear Reactor, Experts Say

The sophisticated computer worm called Stuxnet, which has been targeting industrial operations around the world, was likely designed to take out Iran’s new Bushehr nuclear reactor, cybersecurity experts say. It’s the first known cyber-super-weapon designed to destroy a real-world target, reports the Christian Science Monitor.

Researchers studying the worm say it was built by an advanced attacker with plentiful resources — possibly a nation-state. Initially, experts thought it was designed for industrial espionage, but upon examining its code, they now think it was built for sabotage.

ii. Synchronize Your OpenOffice Documents With Google Docs, Zoho And WebDAV Servers Using Ooo2gd

iii. Microsoft confirms it missed Stuxnet print spooler ‘zero-day’

Contrary to reports, a bug that Microsoft patched last week had been publicly discussed a year and a half ago, security researchers said this week.

Microsoft confirmed Wednesday that it overlooked the vulnerability when it was revealed last year.

The vulnerability in Windows Print Spooler service was one of four exploited by Stuxnet, a worm that some have suggested was crafted to sabotage an Iranian nuclear reactor.

iv. Stuxnet virus may be aimed at Iran nuclear reactor

A highly sophisticated computer worm that has spread through Iran, Indonesia and India was built to destroy operations at one target: possibly Iran’s Bushehr nuclear reactor.

That’s the emerging consensus of security experts who have examined the Stuxnet worm. In recent weeks, they’ve broken the cryptographic code behind the software and taken a look at how the worm operates in test environments. Researchers studying the worm all agree that Stuxnet was built by a very sophisticated and capable attacker, possibly a nation state, and it was designed to destroy something big.

[...]

One of the things that Langner discovered is that when Stuxnet finally identifies its target, it makes changes to a piece of Siemens code called Organisational Block 35. This Siemens component monitors critical factory operations, things that need a response within 100 milliseconds. By messing with Operational Block 35, Stuxnet could easily cause a refinery’s centrifuge to malfunction, but it could be used to hit other targets too, Byres said. “The only thing I can say is that it is something designed to go bang,” he said.

Whoever created Stuxnet developed four previously unknown zero-day attacks and a peer-to-peer communications system, compromised digital certificates belonging to Realtek Semiconductor and JMicron Technology, and displayed extensive knowledge of industrial systems. This is not something that your run-of-the-mill hacker can pull off. Many security researchers think that it would take the resources of a nation state to accomplish.

[...]

Now that the Stuxnet attack is public, the industrial control systems industry has come of age in an uncomfortable way. And clearly it will have more things to worry about. “The problem is not Stuxnet. Stuxnet is history,” said Langner. “The problem is the next generation of malware that will follow.”

Any politically-motived Windows worm shows that technology and politics cannot be separated and they come at a high cost to the public (a side effect). Some people point fingers at Israeli hackers.

Malware believed to be targeting Iran’s Bushehr nuclear power plant may have been created by Israeli hackers

[...]

However Graham Cluley, senior consultant with the online security company Sophos, warned against jumping to conclusions about the target of the attack, saying “sensationalist” headlines were “a worry”. Clulely is wary of reports linking Stuxnet with Israel: “It’s very hard to prove 100% who created a piece of malware, unless you are able to gather evidence from the computer they created it on – or if someone admits it, of course.”

But he said that its characteristics did not suggest a lone group. “I think we need to be careful about pointing fingers without proof, and I think it’s more appropriate – if true – to call this a state-sponsored cyber attack rather than cyber terrorism.”

Stuxnet works by exploiting previously unknown security holes in Microsoft’s Windows operating system. It then seeks out a component called Simatic WinCC, manufactured by Siemens, which controls critical factory operations. The malware even uses a stolen cryptographic key belonging to the Taiwanese semiconductor manufacturer RealTek to validate itself in high-security factory systems.

Should the whole world be flooded with Windows worms just because of political altercations of few nations? Should a better operating system like GNU/Linux be used to mitigate international threats. When does the cyber threat become greater than nuclear threats in an age when everything from food production to energy extraction [1, 2] and travel depends on connected computers? Without energy and transportation, food cannot be grown, cultivated, and delivered; that is where the most fundamental needs can or cannot be met, especially at times of natural disaster or war, so leaving one’s critical systems (that’s almost any system) under Microsoft’s reign is a strategic blunder. Proprietary software is subjected to the sovereignty of its sole maker.

Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

What Else is New


  1. Links 1/10/2014: OPNFV Goes Public, PDF Reader Pullout

    Links for the day



  2. Links 29/9/2014: OpenDaylight Helium Release

    Links for the day



  3. European Patent Office Disorganisation: Problems With the Audit Mechanisms - Part IV

    A prelude to a long article about a thug called Topić, his controversial Battistelli-sponsored appointment, and the removal of auditory functions by Battistelli



  4. More Good News About Demise of Software Patents and Along With Them, Consequently, Patent Trolls

    A weekly roundup of news about patents in the United States and elsewhere, with special focus on software patents



  5. IRC Proceedings: June 22nd, 2014 – September 13th, 2014

    Many IRC logs



  6. Links 28/9/2014: Moto X, End of OpenSUSE 11.4

    Links for the day



  7. CBS Continues to Get Heavily Occupied by Microsoft Staff to Spread Microsoft Propaganda

    The CBS-owned ZDNet continues to hire people who have worked or are currently working for Microsoft and unsurprisingly enough they use their newly-acquired positions to praise Microsoft and bash Microsoft's competition, usually with no disclosure of their conflict of interest



  8. Links 27/9/2014: Linux (Almost) Everywhere, Features Of Linux 3.17

    Links for the day



  9. Microsoft Fakes 'Charity' and Uses Religious Groups to Acquire Lock-in in the Public Sector

    Microsoft's involvements with NGOs and with governments lead to more distrust, more surveillance, less freedom, and ultimately systemic corruption



  10. Bill Gates' Privatisation Crusade

    Mr. Gates, seeking to increase his huge profits and political power, reaches out to Catholic leaders and David Christian



  11. Tux Machines Under DDOS Attack

    Most of Tux Machines continues to work as usual, but some parts are temporarily restricted to keep the server running



  12. Links 26/9/2014: LibreOffice Celebrations, Betas of *buntu

    Links for the day



  13. Links 25/9/2014: KDE Roadmap, Bash Bug, GNOME 3.14 in Next Fedora

    Links for the day



  14. Links 24/9/2014: GNOME 3.14 Released, Bash Has a Bug

    Links for the day



  15. Links 21/9/2014: Fedora 21 Alpha

    Links for the day



  16. More of Bill Gates' Investments in GMO and Mass Indoctrination Under the Disguise of 'Donations'

    Microsoft's arrogant and famously corrupt co-founder is taken to task by those whom he is trying to bamboozle for monopoly, unlimited cross-generational power, and never-ending profit without risk



  17. Home Depot Confirmed a Victim of Microsoft's Bad Security, Microsoft Lays Off Security-Related Staff

    News reports circulate showing that Home Depot was knowingly careless with its Windows dependency while Microsoft lays off staff focused on security



  18. European Patent Office/Organisation - Suspicion of Improper Collusion Between EPO President and Chairman of the Administrative Council: Part III

    A preliminary look at Battistelli's reign and how regulatory powers got abolished, leaving the EPO reckless and largely unaccountable



  19. Links 21/9/2014: xorg-server 1.16.1, Linux Kernel 3.16.3

    Links for the day



  20. Links 20/9/2014: GNOME 3.13.92, Android L

    Links for the day



  21. Scanning Patent Troll Implodes; Is the Podcasting Patent Troll Next?

    MPHJ loses and Personal Audio LLC perhaps wins for the last time since software patents are quickly losing legitimacy in the United States



  22. If CAFC is Not Above the Law, Then it Should be Shut Down Now

    A long series of abuses in CAFC may as well suggest that this court has become broken beyond repair



  23. The Latest From Microsoft Patent Trolls and Patent Partners

    Microsoft-linked and Linux-hostile trolls continue their relentless attacks (albeit with little or no success) while patents as a weapon lose their teeth owing to a Supreme Court ruling



  24. Microsoft Proves That Its Massive Layoffs Are Not About Nokia

    Microsoft is laying off a lot of employees who have nothing at all to do with Nokia



  25. Links 19/9/2014: Another Red Hat Acquisition, Netflix Dumps Microsoft Silverlight and Brings DRM to WWW

    Links for the day



  26. Links 18/9/2014: Windows Copying GNU/Linux, Germany Moves to Security

    Links for the day



  27. Web Site 'Patent Progress' Now Officially 'Powered by CCIA' (FRAND Proponent, Microsoft Front)

    After talking a job at CCIA, "Patent Progress" and its chief author should be treated as dubious on real patent progress



  28. Articles About the Death of Software Patents in the United States

    Recent coverage of software patents and their demise in their country of origin, where even proponents of software patents are giving up



  29. The Death of Software Patents is Already Killing Some Major Patent Trolls

    VirnetX seems to be the latest victim of the demise of software patents in the United States



  30. More Microsoft Layoffs

    More Microsoft layoffs go ahead as the company is unable to compete


CoPilotCo

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

CoPilotCo

Recent Posts