New Twist in the Stuxnet Story

  /     /     /  
Publicated : 23/11/2024   Category : security


New Twist in the Stuxnet Story


What a newly discovered missing link to Stuxnet and the now-revived Flame cyber espionage malware add to the narrative of the epic cyber-physical attack.



Three years after the 2010 discovery of the Stuxnet attack that sabotaged a uranium enrichment process at the Natanz nuclear facility in Iran, researchers at Symantec found what they surmised was a precursor to the known payload that caused the plants centrifuges to spin out of control and fail. This early version of Stuxnet, which they called Stuxnet .5, targeted the Siemens PLC control systems that operate the valves that feed uranium hexafluoride gas into uranium enrichment centrifuges. Stuxnet .5 could close the valves and halt the release of depleted and enriched uranium gases, damaging the equipment and the manufacturing process.
The discovery led Symantecs researchers to revise their time frame of the Stuxnet attack to 2005, two years earlier than the known 2007 to 2009 attacks on the Natanz centrifuges, which were believed to be launched by the US and Israel to derail the possible development of nuclear weapons in Iran.
Flash forward to now, six years after the
2013 Stuxnet .5 finding
, and theres yet another twist to the Stuxnet story. Researchers from Alphabets cybersecurity company Chronicle earlier this month revealed that they have found evidence that a fourth cyber espionage group possibly assisted in Stuxnets attack campaign on the Natanz nuclear facility.
Chronicles Juan Andres Guerrero Saade and Silas Cutler uncovered a link between an older Stuxnet command-and-control component and an older cyber espionage platform called Flowershop - active as far back as 2002 and first discovered by Kaspersky Lab in 2015.
What we realized was that this was essentially the early command-and-control module for Stuxnet - the older version of Stuxnet, Stuxnet. 5, Guerrero Saade says.
Dubbed Stuxshop by Chronicle, the module communicates with known Stuxnet C2 servers and can eliminate dial-up prompts for machines that arent connected to the network. Stuxshop provides yet another clue to Stuxnets creation by multiple groups, they say: It already had been tied to Flame, Duqu, and the Equation Group nation-state cyber espionage families. Like the intel-gathering Flowershop code, Stuxshops features include checking an infected machines Windows version, Internet proxy settings, and registry key information.
Stuxnet was the result of a collaborated framework with a bunch of different groups. It was a hodgepodge of plug-ins, Guerrero Saade says.
The researchers say it appears some Flowershop code was used in the Stuxnet module, which could indicate that two attack development teams were working together or sharing code.
Flowershop was its own intel-gathering platform, a whole different threat actor active for a decade. No one had been able to connect it to Stuxnet until we identified Stuxshop, Guerrero Saade says. Stuxshop shares code from Flowershop, but it was specifically developed for the Stuxnet attack, he says.
The Chronicle researchers first disclosed their
research
at the Kaspersky Security Analyst Summit this month in Singapore.
Symantecs Liam OMurchu, one of the first researchers to study Stuxnet, says he hasnt yet fully analyzed the Stuxshop files, but from his first read, it appears to fit the timeline of his companys discovery of Stuxnet .5.
While OMurchu and other Stuxnet experts say Chronicles new findings dont dramatically alter the Stuxnet story, they do provide more confirmation of the timeline of the attack campaign. To separately confirm the timeline is very good, OMurchu says.
It provides more evidence of Symantecs longtime working theory that the Stuxnet operation dates back as far back as 2002.
Stuxshops timeline fits in with what we had assumed the development timeline would be. We were looking specifically at the destructive part of Stuxnet, so thats what we had, says OMurchu, who is director of development for the security technology and response team at Symantec. We had assumed ... there was a previous version actually gathering information.
Costin Raiu, one of the lead researchers from Kaspersky Lab who hunted down Stuxnet, notes that Chronicles findings follow the threads of previous research, including his firms connecting Flowershop to Stuxnet in private reports to its clients in 2014. With the explosion in more advanced research tools, like the Yara malware investigation tool, and Chronicles access to its VirusTotal platform, researchers are now able to better fill in the gaps of information on advanced attacks like Stuxnet, he says.
Chronicle truly has a unique advantage here because they have excellent sources of data: VirusTotal, Raiu says
.
Stuxshop and Stuxnet .5 were eventually replaced with Stuxnet 1.10 and its command-and-control infrastructure. Stuxnet 1.10 attacked Siemens PLC equipment that ran the Natanz plants centrifuges.
Rekindled Flame
Meantime, Guerrero Saade and Cutler recently found a surprise in their VirusTotal repository: a reincarnated version of the Flame cyber espionage platform, which was last seen in 2012 when it self-destructed. They christened the new variant Flame 2.0, but for now theyre unable to see inside it. The payload is encrypted so we cant really see what its doing, Guerrero Saade says.
Flame 2.0 was apparently compiled sometime after 2014 and landed in VirusTotal in 2016. Ill bet AV companies are aware of it and well find more samples of it, he says.
The researchers are hoping to get help decrypting the sample from other security firms.
Kurt Baumgartner, a security researcher with Kaspersky Lab, says decrypting the newly found Flame 2.0 wont be easy, pointing to the still-uncracked Gauss malware payload that has dogged researchers for seven years. [Flame 2.0 is] probably not going to be cracked anytime soon, he says.
Flames reappearance fits a profile of advanced threat groups that dont really ever die. Sometimes we lose visibility, but we never know if they are really gone. They may have just retooled, or disappeared altogether, Symantecs OMurchu says.
Catching Up?
The Stuxshop discovery - nine years after Stuxnet was first found by researchers - underscores how the cyberweapon was ahead of its time and ahead of threat hunting capabilities and tools available to researchers in the private sector in the early 2000s, experts say. The Stuxnet campaign and its predecessor components had been well underway by the nation-state hackers long before security researchers uncovered it in 2010.
We really werent cyberwar-trained until Stuxnet, Symantecs OMurchu says of the security industry. What we hope is that weve advanced to make it more difficult for them to do things and not be noticed. ... I would hope well be able to find them faster and see traces, but you never really know. We could be missing a bunch of stuff now and then could find it years later, he says.
Related Content:
PLC Worms Pose Stealthy Threat To Industrial Systems
 
Stuxnet Part Of Widespread Cyber-Intrusion Of Iranian Infrastructure, New Film Claims
Duqu 2.0 Attack On Kaspersky Lab Opens Chilling New Chapter In Cyber Espionage
Stuxnet Exploits Still Alive & Well
 
 
 
 
Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industrys most knowledgeable IT security experts. Check out the
Interop agenda
here.

Last News

▸ 7 arrested, 3 more charged in StubHub cyber fraud ring. ◂
Discovered: 23/12/2024
Category: security

▸ Nigerian scammers now turning into mediocre malware pushers. ◂
Discovered: 23/12/2024
Category: security

▸ Beware EMV may not fully protect against skilled thieves. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
New Twist in the Stuxnet Story