stuxnet - a weapon of the future

12
Hardeep Singh Bhurji Page 1 STUXNET Stuxnet is a computer worm. It targets Siemens industrial software and equipment running Microsoft Windows. While it is not the first time that hackers have targeted industrial systems, it is the first discovered malware that spies on and subverts industrial systems, and the first to include a programmable logic controller (PLC) rootkit. Stuxnet is a large, complex piece of malware with many different components and functionalities. Stuxnet is a threat that was primarily written to target an industrial control system or set of similar systems. Industrial control systems are used in gas pipelines and power plants. Its final goal is to reprogram industrial control systems (ICS) by modifying code on programmable logic controllers (PLCs) to make them work in a manner the attacker intended and to hide those changes from the operator of the equipment. In order to achieve this goal the creators amassed a vast array of components to increase their chances of success. This includes zero-day exploits, a Windows rootkit, the first ever PLC rootkit, antivirus evasion techniques, complex process injection and hooking code, network infection routines, peer- to-peer updates, and a command and control interface. The worm initially spreads indiscriminately, but includes a highly specialized malware payload that is designed to target only Siemens supervisory control and data acquisition (SCADA) systems that are configured to control and monitor specific industrial processes. Different variants of Stuxnet targeted five Iranian organizations, with the probable target widely suspected to be uranium enrichment infrastructure Stuxnet is a threat targeting a specific industrial control system likely in Iran, such as a gas pipeline or power plant. The ultimate goal of Stuxnet is to sabotage that facility by reprogramming programmable logic controllers (PLCs) to operate as the attackers intend them to, most likely out of their specified boundaries. The majority of infections were found in Iran. Stuxnet contains many features such as: Self-replicates through removable drives exploiting a vulnerability allowing auto- execution. Microsoft Windows Shortcut ‘LNK/PIF’ Files Automatic File Execution Vulnerability (BID 41732)

Upload: hardeep-bhurji

Post on 11-May-2015

914 views

Category:

Technology


4 download

DESCRIPTION

This article is all about "STUXNET", the first weapon built entirely out of code. It gives a brief insight of what is it all about. A new world of computer programming where you can make deadly weapons with codes. Read the complete article to know more about it. For my presentation on this article visit : http://www.slideshare.net/hardeep4u/stuxnet-more-then-a-virus

TRANSCRIPT

Page 1: Stuxnet - A weapon of the future

Hardeep Singh Bhurji Page 1

STUXNET

Stuxnet is a computer worm. It targets Siemens industrial software and equipment running

Microsoft Windows. While it is not the first time that hackers have targeted industrial systems, it

is the first discovered malware that spies on and subverts industrial systems, and the first to

include a programmable logic controller (PLC) rootkit.

Stuxnet is a large, complex piece of malware with many different components and

functionalities. Stuxnet is a threat that was primarily written to target an industrial control

system or set of similar systems. Industrial control systems are used in gas pipelines and power

plants. Its final goal is to reprogram industrial control systems (ICS) by modifying code on

programmable logic controllers (PLCs) to make them work in a manner the attacker intended

and to hide those changes from the operator of the equipment. In order to achieve this goal the

creators amassed a vast array of components to increase their chances of success. This includes

zero-day exploits, a Windows rootkit, the first ever PLC rootkit, antivirus evasion

techniques, complex process injection and hooking code, network infection routines, peer-

to-peer updates, and a command and control interface. The worm initially spreads

indiscriminately, but includes a highly specialized malware payload that is designed to target

only Siemens supervisory control and data acquisition (SCADA) systems that are configured

to control and monitor specific industrial processes. Different variants of Stuxnet targeted five

Iranian organizations, with the probable target widely suspected to be uranium enrichment

infrastructure

Stuxnet is a threat targeting a specific industrial control system likely in Iran, such as a gas

pipeline or power plant. The ultimate goal of Stuxnet is to sabotage that facility by

reprogramming programmable logic controllers (PLCs) to operate as the attackers intend them

to, most likely out of their specified boundaries.

The majority of infections were found in Iran. Stuxnet contains many features such as:

Self-replicates through removable drives exploiting a vulnerability allowing auto-

execution.

Microsoft Windows Shortcut ‘LNK/PIF’ Files Automatic File Execution

Vulnerability (BID 41732)

Page 2: Stuxnet - A weapon of the future

Hardeep Singh Bhurji Page 2

Spreads in a LAN through a vulnerability in the Windows Print Spooler.

Microsoft Windows Print Spooler Service Remote Code Execution

Vulnerability (BID 43073)

Spreads through SMB by exploiting the Microsoft Windows Server Service

RPC Handling Remote Code Execution Vulnerability (BID 31874).

Copies and executes itself on remote computers through network shares.

Copies and executes itself on remote computers running a WinCC database

server.

Copies itself into Step 7 projects in such a way that it automatically executes

when the Step 7 project is loaded.

Updates itself through a peer-to-peer mechanism within a LAN.

Exploits a total of four unpatched Microsoft vulnerabilities, two of which are

previously mentioned vulnerabilities for self-replication and the other two are

escalation of privilege vulnerabilities that have yet to be disclosed.

Contacts a command and control server that allows the hacker to download and

execute code, including updated versions.

Contains a Windows rootkit that hide its binaries.

Attempts to bypass security products.

Fingerprints a specific industrial control system and modifies code on the

Siemens PLCs to potentially sabo• tage the system.

Hides modified code on PLCs, essentially a rootkit for PLCs

History

The worm was at first identified by the security company VirusBlokAda in mid-June 2010.

Journalist Brian Krebs's 15 July 2010 blog posting was the first widely read report on the

worm. Its name is derived from some keywords discovered in the software.

Kaspersky Lab experts at first estimated that Stuxnet started spreading around March or April

2010, but the first variant of the worm appeared in June 2009. The second variant, with

substantial improvements, appeared in March 2010, apparently because its authors believed that

Stuxnet was not spreading fast enough; a third, with minor improvements, appeared in April

2010. The worm contains a component with a build time-stamp from 3 February 2010. In the

United Kingdom on 25 November 2010, Sky News reported that it had received information

from an anonymous source at an unidentified IT security organization that Stuxnet, or a variation

of the worm, had been traded on the black market.

Page 3: Stuxnet - A weapon of the future

Hardeep Singh Bhurji Page 3

W32.Stuxnet Timeline

Date Event

November

20, 2008

Trojan.Zlob variant found to be using the LNK vulnerability only later identified in Stuxnet.

April, 2009 Security magazine Hakin9 releases details of a remote code execution vulnerability in the

Printer Spooler service. Later identified as MS10-061.

June, 2009 Earliest Stuxnet sample seen. Does not exploit MS10-046. Does not have signed driver files.

January 25,

2010

Stuxnet driver signed with a valid certificate belonging to Realtek Semiconductor Corps.

March,

2010

First Stuxnet variant to exploit MS10-046.

June 17,

2010

Virusblokada reports W32.Stuxnet (named RootkitTmphider). Reports that it’s using a

vulnerability in the processing of shortcuts/.lnk files in order to propagate (later identified as

MS10-046).

July 13,

2010

Symantec adds detection as W32.Temphid (previously detected as Trojan Horse).

July 16,

2010

Microsoft issues Security Advisory for “Vulnerability in Windows Shell Could Allow Remote

Code Execution (2286198)” that covers the vulnerability in processing shortcuts/.lnk files.

Verisign revokes Realtek Semiconductor Corps certificate.

July 17,

2010

Eset identifies a new Stuxnet driver, this time signed with a certificate from JMicron

Technology Corp.

July 19,

2010

Siemens report that they are investigating reports of malware infecting Siemens WinCC

SCADA systems.

Symantec renames detection to W32.Stuxnet.

July 20,

2010

Symantec monitors the Stuxnet Command and Control traffic.

July 22,

2010

Verisign revokes the JMicron Technology Corps certificate.

August 2,

2010

Microsoft issues MS10-046, which patches the Windows Shell shortcut vulnerability.

August 6,

2010

Symantec reports how Stuxnet can inject and hide code on a PLC affecting industrial control

systems.

September

14, 2010

Microsoft releases MS10-061 to patch the Printer Spooler Vulnerability identified by

Symantec in August.

Microsoft report two other privilege escalation vulnerabilities identified by Symantec in

August.

September

30, 2010

Symantec presents at Virus Bulletin and releases comprehensive analysis of Stuxnet.

Page 4: Stuxnet - A weapon of the future

Hardeep Singh Bhurji Page 4

Infection Statistics

As of September 29, 2010, the data has shown that there are approximately 100,000 infected

hosts.

The following graph shows the number of unique infected hosts by country:

Infected Hosts

The following graph shows the number of infected organizations by country based on WAN IP addresses:

Infected Organizations (By WAN IP)

Page 5: Stuxnet - A weapon of the future

Hardeep Singh Bhurji Page 5

Looking at the percentage of infected hosts by country, shows that approximately 60% of

infected hosts are in Iran:

Geographic Distribution of Infections

Stuxnet aims to identify those hosts which have the Siemens Step 7 software installed. The

following chart shows the percentage of infected hosts by country with the Siemens software

installed.

Percentage of Stuxnet infected Hosts with Siemens Software installed

Page 6: Stuxnet - A weapon of the future

Hardeep Singh Bhurji Page 6

Stuxnet Architecture

The heart of Stuxnet consists of a large .dll file that contains many different exports and

resources. In addition to the large .dll file, Stuxnet also contains two encrypted configuration

blocks.

The dropper component of Stuxnet is a wrapper program that contains all of the above

components stored inside itself in a section name “stub”. This stub section is integral to the

working of Stuxnet. When the threat is executed, the wrapper extracts the .dll file from the stub

section, maps it into memory as a module, and calls one of the exports.

A pointer to the original stub section is passed to this export as a parameter. This export in turn

will extract the .dll file from the stub section, which was passed as a parameter, map it into

memory and call another different export from inside the mapped .dll file. The pointer to the

original stub section is again passed as a parameter. This occurs continuously throughout the

execution of the threat, so the original stub section is continuously passed around between

different processes and functions as a parameter to the main payload. In this way every layer of

the threat always has access to the main .dll and the configuration blocks.

In addition to loading the .dll file into memory and calling an export directly, Stuxnet also uses

another technique to call exports from the main .dll file. This technique is to read an executable

template from its own resources, populate the template with appropriate data, such as which .dll

file to load and which export to call, and then to inject this newly populated executable into

another process and execute it. The newly populated executable template will load the original

.dll file and call whatever export the template was populated with.

Although the threat uses these two different techniques to call exports in the main .dll file, it

should be clear that all the functionality of the threat can be ascertained by analyzing all of the

exports from the main .dll file.

Operation

Unlike most malware, Stuxnet does little harm to computers and networks that do not meet

specific configuration requirements; "The attackers took great care to make sure that only their

designated targets were hit...It was a marksman’s job." While the worm is promiscuous, it makes

itself inert if Siemens software is not found on infected computers, and contains safeguards to

prevent each infected computer from spreading the worm to more than three others, and to erase

itself on 24 June 2012. For its targets, Stuxnet contains, among other things, code for a man-in-

the-middle attack that fakes industrial process control sensor signals so an infected system does

not shut down due to abnormal behavior. The worm consists of a layered attack against three

different systems:

Page 7: Stuxnet - A weapon of the future

Hardeep Singh Bhurji Page 7

1. The Windows operating system,

2. Siemens PCS 7, WinCC and STEP7 industrial software applications that run on

Windows and

3. One or more Siemens S7 PLCs.

Windows infection

Stuxnet attacked Windows systems using an unprecedented four zero-day attacks (plus the

CPLINK vulnerability and a vulnerability used by the Conficker worm). It is initially spread

using infected removable drives such as USB flash drives, and then uses other exploits and

techniques such as peer-to-peer RPC to infect and update other computers inside private

networks that are not directly connected to the Internet. Stuxnet is unusually large at half a

megabyte in size, and written in several different programming languages (including C and C++)

which is also irregular for malware. The Windows component of the malware is promiscuous in

that it spreads relatively quickly and indiscriminately.

The malware has both user-mode and kernel-mode rootkit capability under Windows, and its

device drivers have been digitally signed with the private keys of two certificates that were

stolen from separate companies, JMicron and Realtek, that are both located at Hsinchu Science

Park in Taiwan. The driver signing helped it install kernel-mode rootkit drivers successfully

and therefore remain undetected for a relatively long period of time. Both compromised

certificates have been revoked by VeriSign.

Two websites in Denmark and Malaysia were configured as command and control servers for

the malware, allowing it to be updated, and for industrial espionage to be conducted by

uploading information. Both of these websites have subsequently been taken down as part of a

global effort to disable the malware.

Step 7 software infection

Once installed on a Windows system Stuxnet infects project files belonging to Siemens'

WinCC/PCS 7 SCADA control software (Step 7), and subverts a key communication library

of WinCC called s7otbxdx.dll. Doing so intercepts communications between the WinCC

software running under Windows and the target Siemens PLC devices that the software is able

to configure and program when the two are connected via a data cable. In this way, the malware

is able to install itself on PLC devices unnoticed, and subsequently to mask its presence from

WinCC if the control software attempts to read an infected block of memory from the PLC

system. The malware furthermore used a zero-day exploit in the WinCC/SCADA database

software in the form of a hard-coded database password.

Page 8: Stuxnet - A weapon of the future

Hardeep Singh Bhurji Page 8

Overview of normal communications between Step 7 and a Siemens PLC

Overview of Stuxnet hijacking communication between Step 7 software and a Siemens PLC

Page 9: Stuxnet - A weapon of the future

Hardeep Singh Bhurji Page 9

PLC infection

Siemens Simatic S7-300 PLC CPU with three I/O modules attached

The entirety of the Stuxnet code has not yet been understood, but its payload targets only those

SCADA configurations that meet criteria that it is programmed to identify. Stuxnet requires

specific slave variable-frequency drives (frequency converter drives) to be attached to the

targeted Siemens S7-300 system and its associated modules. It only attacks those PLC systems

with variable-frequency drives from two specific vendors: Vacon based in Finland and Fararo

Paya based in Iran. Furthermore, it monitors the frequency of the attached motors, and only

attacks systems that spin between 807 Hz and 1210 Hz. The industrial applications of motors

with these parameters are diverse, and may include pumps or gas centrifuges.

Stuxnet installs malware into memory block DB890 of the PLC that monitors the Profibus

messaging bus of the system. When certain criteria are met, it periodically modifies the

frequency to 1410 Hz and then to 2 Hz and then to 1064 Hz, and thus affects the operation of the

connected motors by changing their rotational speed. It also installs a rootkit—the first such

documented case on this platform—that hides the malware on the system and masks the changes

in rotational speed from monitoring systems.

Speculations about the target and origin

Experts believe that Stuxnet required the largest and costliest development effort in malware

history. Its many capabilities would have required a team of people to program, in-depth

knowledge of industrial processes, and an interest in attacking industrial infrastructure. Eric

Byres, who has years of experience maintaining and troubleshooting Siemens systems, told

Page 10: Stuxnet - A weapon of the future

Hardeep Singh Bhurji Page 10

Wired that writing the code would have taken many man-months, if not years. Symantec

estimates that the group developing Stuxnet would have consisted of anywhere from five to

thirty people, and would have taken six months to prepare. The Guardian, the BBC and The

New York Times all reported that experts studying Stuxnet considered that the complexity of the

code indicates that only a nation state would have the capabilities to produce it. The self-destruct

and other safeguards within the code imply that a Western government was responsible, with

lawyers evaluating the worm's ramifications.

It has been speculated that Israel and the United States may have been involved.

In May 2011, the PBS program Need To Know cited a statement by Gary Samore, White House

Coordinator for Arms Control and Weapons of Mass Destruction, in which he said, "we're glad

they [the Iranians] are having trouble with their centrifuge machine and that we – the US and its

allies – are doing everything we can to make sure that we complicate matters for them", offering

"winking acknowledgement" of US involvement in Stuxnet. According to the British Daily

Telegraph, a showreel that was played at a retirement party for the head of the Israel Defence

Forces (IDF), Gabi Ashkenazi, included references to Stuxnet as one of his operational

successes as the IDF chief of staff.

Iran as target

Ralph Langner, the researcher who identified that Stuxnet infected PLCs, first speculated

publicly in September 2010 that the malware was of Israeli origin, and that it targeted Iranian

nuclear facilities. However Langner more recently, in a TED Talk recorded in February 2011,

stated that, "My opinion is that the Mossad is involved but that the leading force is not Israel.

The leading force behind Stuxnet is the cyber superpower—there is only one; and that's the

United States." Kevin Hogan, Senior Director of Security Response at Symantec, reported that

the majority of infected systems were in Iran (about 60%), which has led to speculation that it

may have been deliberately targeting "high-value infrastructure" in Iran including either the

Bushehr Nuclear Power Plant or the Natanz nuclear facility. Langner called the malware "a

one-shot weapon" and said that the intended target was probably hit, although he admitted this

was speculation. Another German researcher, Frank Rieger, was the first to speculate that

Natanz was the target.

Natanz nuclear facilities

According to the Israeli newspaper Haaretz, experts on Iran and computer security specialists

are increasingly convinced that Stuxnet was meant "to sabotage the uranium enrichment facility

at Natanz – where the centrifuge operational capacity has dropped over the past year by 30

percent." On 23 November 2010 it was announced that uranium enrichment at Natanz had

ceased several times because of a series of major technical problems. A "serious nuclear

Page 11: Stuxnet - A weapon of the future

Hardeep Singh Bhurji Page 11

accident" occurred at the site in the first half of 2009, which is speculated to have forced the head

of Iran's Atomic Energy Organization Gholam Reza Aghazadeh to resign. Statistics published

by the Federation of American Scientists (FAS) show that the number of enriched centrifuges

operational in Iran mysteriously declined from about 4,700 to about 3,900 beginning around the

time the nuclear incident WikiLeaks mentioned would have occurred. The Institute for Science

and International Security (ISIS) suggests in a report published in December 2010 that Stuxnet

is "a reasonable explanation for the apparent damage" at Natanz and may have destroyed up to

1000 centrifuges (10 percent) sometime between November 2009 and late January 2010. The

authors conclude:

The attacks seem designed to force a change in the centrifuge’s rotor speed, first raising the

speed and then lowering it, likely with the intention of inducing excessive vibrations or

distortions that would destroy the centrifuge. If its goal was to quickly destroy all the centrifuges

in the FEP, Stuxnet failed. But if the goal was to destroy a more limited number of centrifuges

and set back Iran’s progress in operating the FEP, while making detection difficult, it may have

succeeded, at least temporarily.

The ISIS report further notes that Iranian authorities have attempted to conceal the breakdown by

installing new centrifuges on a large scale. The virus worked by first causing an infected Iranian

IR-1 centrifuge to increase from its normal operating speed of 1,064 hertz to 1,410 hertz for 15

minutes before returning to its normal frequency. Twenty-seven days later, the virus went back

into action, slowing the infected centrifuges down to a few hundred hertz for a full 50 minutes.

The stresses from the excessive, then slower speeds, caused the aluminum centrifugal tubes to

expand, often forcing parts of the centrifuges into sufficient contact with each other to destroy

the machine. According to the Washington Post, International Atomic Energy Agency

(IAEA) cameras installed in the Natanz facility recorded the sudden dismantling and removal of

approximately 900–1000 centrifuges during the time the Stuxnet worm was reportedly active at

the plant. Iranian technicians, however, were able to quickly replace the centrifuges and the

report concluded that uranium enrichment was likely only briefly disrupted.

Iranian reaction

The Associated Press reported that the semi-official Iranian Students News Agency released a

statement on 24 September 2010 stating that experts from the Atomic Energy Organization of

Iran met in the previous week to discuss how Stuxnet could be removed from their systems.

Page 12: Stuxnet - A weapon of the future

Hardeep Singh Bhurji Page 12

The head of the Bushehr Nuclear Power Plant told Reuters that only the personal computers

of staff at the plant had been infected by Stuxnet and the state-run newspaper Iran Daily quoted

Reza Taghipour, Iran's telecommunications minister, as saying that it had not caused "serious

damage to government systems". The Director of Information Technology Council at the Iranian

Ministry of Industries and Mines, Mahmud Liaii, has said that: "An electronic war has been

launched against Iran... This computer worm is designed to transfer data about production lines

from our industrial plants to locations outside Iran."

On 29 November 2010, Iranian president Mahmoud Ahmadinejad stated for the first time that

a computer virus had caused problems with the controller handling the centrifuges at its Natanz

facilities. According to Reuters he told reporters at a news conference in Tehran, "They

succeeded in creating problems for a limited number of our centrifuges with the software they

had installed in electronic parts."

Summary

Stuxnet represents the first of many milestones in malicious code history – it is the first to exploit

four 0-day vulnerabilities, compromise two digital certificates, and inject code into industrial

control systems and hide the code from the operator. Whether Stuxnet will usher in a new

generation of malicious code attacks towards real-world infrastructure—overshadowing the vast

majority of current attacks affecting more virtual or individual assets—or if it is a once- in-a-

decade occurrence remains to be seen.

Stuxnet is of such great complexity—requiring significant resources to develop—that few

attackers will be capable of producing a similar threat, to such an extent that we would not

expect masses of threats of similar in sophistication to suddenly appear. However, Stuxnet has

highlighted direct-attack attempts on critical infrastructure are possible and not just theory or

movie plotlines.

The real-world implications of Stuxnet are beyond any threat we have seen in the past. Despite

the exciting challenge in reverse engineering Stuxnet and understanding its purpose, Stuxnet is

the type of threat we hope to never see again.