Bonum Certa Men Certa

Who Needs Windows Back Doors When It's So Insecure?

Mohammad Mosaddeq



Summary: Stuxnet is allegedly part of a plan to infect computer systems in Iran for political reasons, according to an increasing body of evidence

SO, it's starting to look like Stuxnet [1, 2, 3, 4, 5, 6, 7, 8, 9, 10] was part of a plot to derail Iran's nuclear programme [1, 2]. Stuxnet makes use of zero-day Windows vulnerabilities rather than back doors. Will governments finally realise that foreign governments can use Windows against them? Software freedom is essential to one's autonomy.



The debate about Stuxnet and Iran is only starting. So far we've come across the following reports (there are many more):

i. Advanced Computer Worm Was Specifically Designed to Attack Iranian Nuclear Reactor, Experts Say

The sophisticated computer worm called Stuxnet, which has been targeting industrial operations around the world, was likely designed to take out Iran’s new Bushehr nuclear reactor, cybersecurity experts say. It’s the first known cyber-super-weapon designed to destroy a real-world target, reports the Christian Science Monitor.

Researchers studying the worm say it was built by an advanced attacker with plentiful resources — possibly a nation-state. Initially, experts thought it was designed for industrial espionage, but upon examining its code, they now think it was built for sabotage.


ii. Synchronize Your OpenOffice Documents With Google Docs, Zoho And WebDAV Servers Using Ooo2gd

iii. Microsoft confirms it missed Stuxnet print spooler 'zero-day'

Contrary to reports, a bug that Microsoft patched last week had been publicly discussed a year and a half ago, security researchers said this week.

Microsoft confirmed Wednesday that it overlooked the vulnerability when it was revealed last year.

The vulnerability in Windows Print Spooler service was one of four exploited by Stuxnet, a worm that some have suggested was crafted to sabotage an Iranian nuclear reactor.


iv. Stuxnet virus may be aimed at Iran nuclear reactor

A highly sophisticated computer worm that has spread through Iran, Indonesia and India was built to destroy operations at one target: possibly Iran's Bushehr nuclear reactor.

That's the emerging consensus of security experts who have examined the Stuxnet worm. In recent weeks, they've broken the cryptographic code behind the software and taken a look at how the worm operates in test environments. Researchers studying the worm all agree that Stuxnet was built by a very sophisticated and capable attacker, possibly a nation state, and it was designed to destroy something big.

[...]

One of the things that Langner discovered is that when Stuxnet finally identifies its target, it makes changes to a piece of Siemens code called Organisational Block 35. This Siemens component monitors critical factory operations, things that need a response within 100 milliseconds. By messing with Operational Block 35, Stuxnet could easily cause a refinery's centrifuge to malfunction, but it could be used to hit other targets too, Byres said. "The only thing I can say is that it is something designed to go bang," he said.

Whoever created Stuxnet developed four previously unknown zero-day attacks and a peer-to-peer communications system, compromised digital certificates belonging to Realtek Semiconductor and JMicron Technology, and displayed extensive knowledge of industrial systems. This is not something that your run-of-the-mill hacker can pull off. Many security researchers think that it would take the resources of a nation state to accomplish.

[...]

Now that the Stuxnet attack is public, the industrial control systems industry has come of age in an uncomfortable way. And clearly it will have more things to worry about. "The problem is not Stuxnet. Stuxnet is history," said Langner. "The problem is the next generation of malware that will follow."


Any politically-motived Windows worm shows that technology and politics cannot be separated and they come at a high cost to the public (a side effect). Some people point fingers at Israeli hackers.

Malware believed to be targeting Iran's Bushehr nuclear power plant may have been created by Israeli hackers

[...]

However Graham Cluley, senior consultant with the online security company Sophos, warned against jumping to conclusions about the target of the attack, saying "sensationalist" headlines were "a worry". Clulely is wary of reports linking Stuxnet with Israel: "It's very hard to prove 100% who created a piece of malware, unless you are able to gather evidence from the computer they created it on – or if someone admits it, of course."

But he said that its characteristics did not suggest a lone group. "I think we need to be careful about pointing fingers without proof, and I think it's more appropriate – if true – to call this a state-sponsored cyber attack rather than cyber terrorism."

Stuxnet works by exploiting previously unknown security holes in Microsoft's Windows operating system. It then seeks out a component called Simatic WinCC, manufactured by Siemens, which controls critical factory operations. The malware even uses a stolen cryptographic key belonging to the Taiwanese semiconductor manufacturer RealTek to validate itself in high-security factory systems.


Should the whole world be flooded with Windows worms just because of political altercations of few nations? Should a better operating system like GNU/Linux be used to mitigate international threats. When does the cyber threat become greater than nuclear threats in an age when everything from food production to energy extraction [1, 2] and travel depends on connected computers? Without energy and transportation, food cannot be grown, cultivated, and delivered; that is where the most fundamental needs can or cannot be met, especially at times of natural disaster or war, so leaving one's critical systems (that's almost any system) under Microsoft's reign is a strategic blunder. Proprietary software is subjected to the sovereignty of its sole maker.

Recent Techrights' Posts

'India Today' is a Slopfarm, Sometimes 'Covering' "Linux" With Slop Images
New example of pure BS
Rumours of IBM Layoffs Again, This Time Marketing
It's "bad marketing" to talk about layoffs
Slopwatch: linuxsecurity.com and hamradio.my (in Planet Ubuntu) Are at It Again With LLM Slop About "Linux"
LLM slop does not save time
Bluewashing Ends DEI at IBM and at Red Hat (HR or Hiring Become Gender- and Race-Neutral)
All that "whitelist is racist" stuff is likely a thing of the past
 
Sierra Leone: Android Up to Record Highs, Windows Falls to Record Lows of Almost 5% (15 Years Ago It Was 100%)
This is what happens when about 83% of Web requests come from mobile
Margarita Manterola (marga, Google) & Debian DebConf13 Swiss venue intrigue
Reprinted with permission from Daniel Pocock
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Friday, March 14, 2025
IRC logs for Friday, March 14, 2025
Gemini Links 14/03/2025: Grizzy Bear and Prime Beats
Links for the day
Links 14/03/2025: ProPublica Admitting That It Uses Slop (Foolish Move), RIP Mark Klein
Links for the day
Windows is Fast Becoming Insignificant to Zimbabweans
based on this survey, less than 1 in 6 Web requests may originate from Windows
The Fall of the Open Source Initiative (OSI): The OSI Does Not Speak For You, OSI Staff Speaks for GAFAM/Microsoft (the Paymasters)
they speak for proprietary software companies, but they wear "open" on their sleeve
Microsoft Money Used for Abuse of Women and Against Journalism in Support of Women (the Victims)
"Never interrupt your opponent while he is in the middle of making a mistake."
Links 14/03/2025: Chinese Tensions With Australia, Putin Turns Down Ceasefire
Links for the day
Gemini Links 14/03/2025: Löjl and Docker Context Stuff
Links for the day
Links 14/03/2025: Scam Currencies in the US and Oligarchs (Including GAFAM) Controlling All the Major Policies
Links for the day
Antisemitic Attacks on Richard Matthew Stallman (RMS) in Wikipedia This Week
Did the man strike a nerve or what?
Links 13/03/2025: Intel Rotates Figurehead and South Korea Imports Karen People From Myanmar
Links for the day
Meanwhile at Microsoft Canonical...
Promoting proprietary surveillance by a company that actively attacks Linux in a lot of ways
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Thursday, March 13, 2025
IRC logs for Thursday, March 13, 2025
Links 13/03/2025: Calculators and Spreadsheets, Returning to a Human Internet
Links for the day
Links 13/03/2025: Further Assaults on Science and Education in the US
Links for the day
Expect XBox to Be Shut Down Like Skype
"hey hi"-washing fools nobody
Truth Hurts (Especially Some Dishonest and/or Greedy People), But Reporting Truth is What Makes Journalism Valuable to the General Public and Helps Protect Society From Abuse by Sociopaths or Pathological Liars
When it comes to reporting, we're on the side of female victims, not the men who strangle them.
New Paper Reveals the Web (and Net) Drowns in LLM Slop, "Linux" is Impacted Too
It will be getting harder to trust anything on the Web
Links 13/03/2025: RIP, Carl Lundström; Tesla (the Company, Not Scientist It Piggybacks) Besieged by Public Backlash
Links for the day
Gemini Links 13/03/2025: MElon "Greek Tragedy" and Going Offline More
Links for the day
Richard Matthew Stallman, or rms (RMS), Turns 72 This Coming Weekend
This coming Sunday he deserves a cake
Links 13/03/2025: COVID-19 Legacies and "Modern" Cars as Spying Machines on Wheels
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Wednesday, March 12, 2025
IRC logs for Wednesday, March 12, 2025