Facebook with Latestnigeriannews  Twieet with latestnigeriannews  RSS Page Feed
Home  |  All Headlines  |  Punch  |  Thisday  |  Daily Sun  |  Vanguard   |  Guardian  |  The Nation  |  Daily Times  |  Daily Trust  |  Daily Independent
World  |  Sports  |  Technology  |  Entertainment  |  Business  |  Politics  |  Tribune  |  Leadership  |  National Mirror  |  BusinessDay  |  More Channels...

Viewing Mode:

Archive:

  1.     Tool Tips    
  2.    Collapsible   
  3.    Collapsed     
Click to view all Entertainment headlines today

Click to view all Sports headlines today

Stuxnet Cyber Bomb: How prepared is Nigeria

Published by Guardian on Thu, 21 Apr 2011


HOW will/should Software impact on our national development and securitynow and in the future Are we aware of the monumental risk in the procurement, application and use of Software outside the Indigenous control How prepared are we to respond to a major Software-related disaster in our emerging digital economyThere are currently more question than answersdue to the abandonment of national responsibility on indigenous software developmentThe Stuxnet Worm Enter the worlds first weaponised computer virus! The evidence that the new world 3WW will be built, continue to be built, forth and sustained entirely by SOFTWARE knowledge and intelligence capacities has ultimately been served and delivered by Stuxnet as it hits its remote target in Iran Republic.The Institute of Software Practitioners of Nigeria (ISPON) is deeply concerned that a silent economic digital warfare may have began in the Continentas the race (once more) for the exploitation and control Africas resources through the Software conduit - may have began. At last, the economic Cyber-virus war is here. It is against this background that makes it a strategic imperative to declare the mandatory development, acquisition, patronage, application and use as a state of emergency.Even in peacetime, recent electronic viruses have shown a disturbing ability to disrupt U.S. military electronic systems and bases. It will be recalled hat the United states Department of Defense acknowledged that between 2004 to mid-2005, about 79,000 cyber attacks was launched on U.S. armed forces Web sites claiming that a disproportionate number of them appear to have been launched from Web sites located in   China.Indeed, Chinese military journals in recent years have even in public discussion given high priority to discussions of concepts of asymmetrical war whereby Americas vast high- tech superiority in real time intelligence, weapons targeting and command-and-control could be disrupted and neutralized in the event of an all-scale conflict.There are even suspicions among some U.S. cyber analysts that the Zotob computer worm that wreaked havoc on computer systems around the world in August 2005 may have been developed in China and that it was expressly targeted on a key U.S. military installation in the Western Pacific. It will be recalled that in recent memory, the U.S. military officials publicly admitted that the Zotob worm infiltrated thousands of systems on the huge American military base on the Japanese island of Okinawa.Today, it may be too early to state that the third world war (WW3) have started underground, through the digital cyberspacehowever, one may be right to bet on the fact that WW3 had indeed already startedfrom the look of things going on in the Iran Nuclear Reactor Plant.According to a reliable school of thought, This would have been a 20th Century job for James Bond. The mission: Infiltrate the highly advanced; securely guarded enemy headquarters where scientists in the clutches of an evil master are secretly building a weapon that can destroy the world. Then render that weapon harmless and escape undetected. But in the 21st century, Bond doesnt get the call. Instead, the job is handled by a suave and very sophisticated secret computer worm, a jumble of code called Stuxnet, which in the last year has not only crippled Irans nuclear program but has caused a major rethinking of computer security around the globe.Intelligence agencies, computer security companies and the nuclear industry have been trying to analyze the worm since it was discovered in June 2010 by a Belarus-based company that was doing business in Iran And what theyve all found, says Sean McGurk, the Homeland Security Departments acting director of national cyber security and communications integration, is a game changer.New intelligent sources have revealed that the construction of the worm was so advanced; it was like the arrival of an F-35 into a World War 1battlefield, says Ralph Langner, the computer expert who was the first to sound the alarm about Stuxnet. Others have called it the first weaponized computer virus.Simply put, Stuxnet is an incredibly advanced, undetectable computer worm that took years to construct and was designed to jump from computer to computer until it found the specific, protected control system that it aimed to destroy: Irans nuclear enrichment program.The target was seemingly impenetrable; for security reasons, it laid several stories underground and was not connected to the World Wide Web. And that meant Stuxnet had to act as sort of a computer cruise missile: As it made its passage through a set of unconnected computers, it had to grow and adapt to security measures and other changes until it reached one that could bring it into the nuclear facility. When it ultimately found its target, it would have to secretly manipulate it until it was so compromised it ceased normal functions.To those of us who may have code-tested programming erase-bond scripts to Application software such as Payroll and even Mini-Banking Solutions this may not be rocket science, but to a great majority, it demonstrate the complexity of the subject matter - because, finally, after the job was done, the Stuxnet worm would have to destroy itself without leaving a trace.The above is what have happened at Irans nuclear facilitiesboth at Natanz, which houses the centrifuge arrays used for processing uranium into nuclear fuel, and, to a lesser extent, at Bushehr, Irans nuclear power plant. Based on reliable studies, at Natanz site, for almost 17 months,Stuxnet quietly worked its way into the system and targeted a specific componentthe frequency converters made by the German equipment manufacturer Siemens that regulated the speed of the spinning centrifuges used to create nuclear fuel (PAGE 2)The worm then took control of the speed at which the centrifuges spun, making them turn so fast in a quick burst that they would be damaged but not destroyed. And at the same time, the worm masked that change in speed from being discovered at the centrifuges control panel. At Bushehr, meanwhile, a second secret set of codes, which Langner called digital warheads, targeted the Russian-built power plants massive steam turbine.The Journey of the Stuxnet Worm: Heres how it worked, according to experts who have examined the worm: The nuclear facility in Iran runs an air gap security system, meaning it has no connections to the Web, making it secure from outside penetration. Stuxnet was designed and sent into the area around Irans Natanz nuclear power plantjust how may never be knownto infect a number of computers on the assumption that someone working in the plant would take work home on a flash drive, acquire the worm and then bring it back to the plant. Once the worm was inside the plant, the next step was to get the computer system there to trust it and allow it into the system. That was accomplished because the worm contained a digital certificate stolen from JMicron, a large company in an industrial park in Taiwan. (When the worm was later discovered it quickly replaced the original digital certificate with another certificate, also stolen from another company, Realtek, a few doors down in the same industrial park in Taiwan.Once allowed entry, the worm contained four Zero Day elements in its first target, the Windows 7 operating system that controlled the overall operation of the plant. Zero Day elements are rare and extremely valuable vulnerabilities in a computer system that can be exploited only once. Two of the vulnerabilities were known, but the other two had never been discovered. Experts say no hacker would waste Zero Days in that manner.After penetrating the Windows operating system, the code then targeted the Siemens operating system that controlled the plant. Once that was in its grip it then took over the frequency converters that ran the centrifuges. To do that it used specifications from the manufacturers of the converters. One was Vacon, Finnish Company, and the other Fararo Paya, an Iranian company. What surprises experts at this step is that the Iranian company was so secret that not even the IAEA knew about it. The worm also knew that Siemens, the German manufacturer, and remarkablyhow that system worked as well and how to mask its activities from it built the complex control system that ran the centrifuges.Masking itself from the plants security and other systems, the worm then ordered the centrifuges to rotate extremely fast, and then to slow down precipitously.This damaged the converter, the centrifuges and the bearings, and it corrupted the uranium in the tubes.It also left Iranian nuclear engineers wondering what was wrong, as computer checks showed no malfunctions in the operating system.Estimates are that this went on for more than a year, leaving the Iranian program in chaos. And as it did, the worm grew and adapted throughout the system. As new worms entered the system, they would meet and adapt and become increasingly sophisticated. During this time the worms reported back to two mysterious servers that had to be run by intelligence agencies, one in Denmark and one in Malaysia. The servers monitored the worms as they infiltrated Natanz. Efforts to find those servers since then have yielded no results. This went on until June of last year, when a Belarusan company working on the Iranian power plant in Beshehr discovered it in one of its machines. It quickly put out a notice on a Web network monitored by computer security experts around the world. Ordinarily these experts would immediately begin tracing the worm and dissecting it, looking for clues about its origin and other details.But that didnt happen, because within minutes all the alert sites came under attack and were inoperative for 24 hours. I had to use e-mail to send notices but I couldnt reach everyone. Whoever made the worm had a full day to eliminate all traces of the worm that might lead us them, Eric Byres, a computer security expert who has examined the Stuxnet. No hacker could have done that.Experts, including inspectors from the International Atomic Energy Agency (IAEA,) say that, despite Irans claims to the contrary, the worm was successful in its goal: causing confusion among Irans nuclear engineers and disabling their nuclear program. Because of the secrecy surrounding the Iranian program, no one can be certain of the full extent of the damage. But sources inside Iran and elsewhere say that the Iranian centrifuge program has been operating far below its capacity and that the uranium enrichment program had stagnated during the time the worm penetrated the underground facility. Only 4,000 of the 9,000 centrifuges Iran was known to have were put into use. Some suspect that is because of the critical need to replace ones that were damaged.And the limited number of those in use dwindled to an estimated 3,700 as problems engulfed their operation. IAEA inspectors say the sabotage better explains the slowness of the program, which they had earlier attributed to poor equipment manufacturing and management problems. As Iranians struggled with the setbacks, they began searching for signs of sabotage.From inside Iran there have been unconfirmed reports that the head of the plant was fired shortly after the worm wended its way into the system and began creating technical problems, and that some scientists who were suspected of espionage disappeared or were executed. And counter intelligence agents began monitoring all communications between scientists at the site, creating a climate of fear and paranoia. Iran has adamantly stated that the bug has not hit its nuclear program.But in doing so it has backhandedly confirmed that its nuclear facilities were compromised. When Hamid Alipour, head of the nations Information Technology Company, announced in September that the worm had hit 30,000 Iranian computers but the nuclear facilities were safe, he added that among those hit were the personal computers of the scientists at the nuclear facilities. Experts say that Natanz and Bushehr could not have escaped the worm if it was in their engineers computers.We brought it into our lab to study it and even with precautions it spread everywhere at incredible speed, Byres said. The worm was designed not to destroy the plants but to make them ineffective. By changing the rotation speeds, the bearings quickly wear out and the equipment has to be replaced and repaired. The speed changes also impact the quality of the uranium processed in the centrifuges creating technical problems that make the plant ineffective, he explained.In other words the worm was designed to allow the Iranian program to continue but never succeed, and never to know why. One additional impact that can be attributed to the worm, according to David Albright of the Institute for Science and International Studies, is that the lives of the scientists working in the facility have become a living hell because of counter-intelligence agents brought into the plant to battle the breach. Ironically, even after its discovery, the worm has succeeded in slowing down Irans reputed effort to build an atomic weapon. And Langer says that the efforts by the Iranians to cleanse Stuxnet from their system will probably take another year to complete, and during that time the plant will not be able to function anywhere normally.But as the extent of the worms capabilities is being understood, its genius and complexity has created another perplexing question: Who did itSpeculation on the worms origin initially focused on hackers or even companies trying to disrupt competitors. But as engineers tore apart the virus they learned not only the depth of the code, its complex targeting mechanism, (despite infecting more than 100,000 computers it has only done damage at Natanz,) the enormous amount of work that went into itMicrosoft estimated that it consumed 10,000 man days of labor and about what the worm knew, the clues narrowed the number of players that have the capabilities to create it to a handful.
Click here to read full news..

All Channels Nigerian Dailies: Punch  |  Vanguard   |  The Nation  |  Thisday  |  Daily Sun  |  Guardian  |  Daily Times  |  Daily Trust  |  Daily Independent  |   The Herald  |  Tribune  |  Leadership  |  National Mirror  |  BusinessDay  |  New Telegraph  |  Peoples Daily  |  Blueprint  |  Nigerian Pilot  |  Sahara Reporters  |  Premium Times  |  The Cable  |  PM News  |  APO Africa Newsroom

Categories Today: World  |  Sports  |  Technology  |  Entertainment  |  Business  |  Politics  |  Columns  |  All Headlines Today

Entertainment (Local): Linda Ikeji  |  Bella Naija  |  Tori  |  Daily News 24  |  Pulse  |  The NET  |  DailyPost  |  Information Nigeria  |  Gistlover  |  Lailas Blog  |  Miss Petite  |  Olufamous  |  Stella Dimoko Korkus Blog  |  Ynaija  |  All Entertainment News Today

Entertainment (World): TMZ  |  Daily Mail  |  Huffington Post

Sports: Goal  |  African Football  |  Bleacher Report  |  FTBpro  |  Softfootball  |  Kickoff  |  All Sports Headlines Today

Business & Finance: Nairametrics  |  Nigerian Tenders  |  Business Insider  |  Forbes  |  Entrepreneur  |  The Economist  |  BusinessTech  |  Financial Watch  |  BusinessDay  |  All Business News Headlines Today

Technology (Local): Techpoint  |  TechMoran  |  TechCity  |  Innovation Village  |  IT News Africa  |  Technology Times  |  Technext  |  Techcabal  |  All Technology News Headlines Today

Technology (World): Techcrunch  |  Techmeme  |  Slashdot  |  Wired  |  Hackers News  |  Engadget  |  Pocket Lint  |  The Verge

International Networks:   |  CNN  |  BBC  |  Al Jazeera  |  Yahoo

Forum:   |  Nairaland  |  Naij

Other Links: Home   |  Nigerian Jobs