Cyber warfare gains in sophistication

Assignment Help Basic Statistics
Reference no: EM131040158

Cyber warfare Gains in Sophistication

Stuxnet and more recent types of malicious software, or malware- particularly Duqu, Flame, and Gauss-herald a frightening new era in cyberwarfare. China, Russia, the United States, and other nations have been engaging in cyberw arfare for several years, and these four types of malware represent a major technological escalation. All four types are so sophisticated and complex that they appear to have been developed by nation states for use in ongoing (as of mid-2013) cyberespionage operations. Stuxnet, first launched in June 2009 and discovered in July 2010, is malware that targets industrial supervisory control and data acquisition systems. In particular, Stuxnet targets Siemens SCADA systems that are configured to control and monitor specific industrial processes.

In fact, security experts around the world suspect that the malware's target was the uranium enrichment industrial infrastructure in Iran. On November 29, 2010, Iran confi rmed that its nuclear program had been damaged by Stuxnet. The malware may have damaged Iran's nuclear facilities in Natanz and eventually delayed the start-up of the Bushehr nuclear power plant. Whoever constructed Stuxnet must have possessed an indepth knowledge of nuclear industrial processes.

Stuxnet appears to have impaired Iran's computer-controlled uranium centrifuges, which mysteriously lost 30 percent of their production capacity, thereby delaying any plans to produce a nuclear weapon. After infecting Iran's nuclear facilities, Stuxnet spread rapidly throughout the country, affecting more than 30,000 Internet Protocol addresses. This problem was compounded by the malware's ability to mutate, meaning that new versions of Stuxnet continued to spread. Stuxnet is believed (but not known) to have been written through a partnership between Israel and the United States. Duqu is a type of malware discovered in 2011 on computers in Iran, Sudan, and other countries that was designed to steal documents and other data from infected computers. Duqu appeared to gather intelligence specifically about the design of SCADA systems.

The malware does not actually cause damage to infected computers; rather, it gathers information required for future attacks. Duqu creates a back door into computer systems that remains open for only 36 days, at which time the malware deletes itself. The reason for this short time period is probably to limit discovery. Another sophisticated type of malware, called Flame, has been detected infecting systems in Iran, Israel, Palestine, Sudan, Lebanon, Saudi Arabia, and Egypt. Flame was officially discovered by Kaspersky Lab (www.kaspersky.com) in 2012 when the United Nations International Telecommunications Union asked the fi rm to look into reports that computers belonging to the Iranian Oil Ministry and the Iranian National Oil Company had been infected with malware that was stealing and then deleting information from infected systems. Although Flame has both a different purpose and composition than Stuxnet and it appears to have been written by different programmers, its complexity, the geographic scope of its infections, and its behavior strongly indicate that it is related to Stuxnet. Flame appears to be designed primarily to spy on the users of infected computers and steal data from them, including documents, recorded conversations, and keystrokes. Flame has several cyberespionage functions. It turns on the internal microphone of an infected computer to secretly record conversations that occur either over Skype or in the computer's vicinity; it scans for Bluetooth-enabled devices in the vicinity of an infected computer to gather names and phone contacts from the contacts folder; it captures and stores frequent screenshots of activity on infected computers, such as instant messaging and e-mail communications; and it opens a backdoor to infected systems.

Flame does not replicate automatically by itself. The spreading mechanisms are turned off by default and must be switched on by the attackers before the malware will spread. This feature is likely intended to control the spread of the malware and to decrease the likelihood that it will be detected. Another type of malware, called Gauss, is closely related to Flame and Stuxnet. Gauss blends cyber-surveillance with an online banking Trojan horse. It can steal access credentials for various online banking systems and payment methods, as well as browser history, social networking and instant messaging information, and passwords. It can also intercept cookies from PayPal, Citibank, MasterCard, American Express, Visa, eBay, Gmail, Hotmail, Yahoo!, Facebook, Amazon, and some Middle Eastern banks. Gauss appears to target Lebanese banks as well as Citibank and PayPal, according to Kaspersky Lab. At the time of this writing (mid-2013), Gauss had infected some 2,500 systems in 25 countries, with the majority of infected computers located in Lebanon. Like Flame and Duqu, Gauss is programmed with a built-in time-to-live.

Once that time limit is reached, Gauss deletes itself completely from an infected system. Unfortunately, the techniques used in sophisticated, nationbacked malware are trickling down to less-skilled programmers who target regular Web users and their online accounts or credit card details. As a result, we are all at greater risk from cybercriminals. Sources:

Questions
1.Discuss the implications of the precisely targeted nature of the Stuxnet, Duqu, Flame, and Gauss attacks.
2. Analyze the statement: "Nations use malware such as Stuxnet, Duqu, Flame, and Gauss when their only alternative is to go to war."
3.Discuss the implications that these four types of malware have for all of us

Reference no: EM131040158

Questions Cloud

Taxable income for a single person : What is the amount of taxes paid for 2014 for $65,000 of taxable income for a single person? (rounded to the nearest dollar and NO dollar sign $ or comma needed)
Statutorily protected employee organizations under the act : What are statutorily protected employee organizations under the Act? What standards does the NLRB apply to determine weather a group is an employee organizations for purposes of the act?
What is the marginal tax rate : What is the marginal tax rate for 2014 for $65,000 of taxable income for a single person?
How should the terminal value or going concern be estimated : What is the total value of AirThread before considering any synergies? What is the value of AirThread, assuming Ms. Zhang's estimates for synergies are accurate?
Cyber warfare gains in sophistication : Stuxnet and more recent types of malicious software, or malware- particularly Duqu, Flame, and Gauss-herald a frightening new era in cyberwarfare. China, Russia, the United States, and other nations have been engaging in cyberw arfare for several ..
Use database normalization techniques to split the flat file : Import and Structure Data - Use the provided data sets to import tables into a blank access database and Use database normalization techniques to split the flat file databases into a relational database
Who is harmed by the library project : Who is harmed by the Library Project? Make a list of harmed groups, and for each group, try to devise a solution that would eliminate or lessen the harm. Why is Google pursuing the Library Project? What is in it for Google? Make a list of benefits to..
Question regarding the marketing operations : How are the four major functions of management (planning,organising, leading and controlling) are related to the marketing operations, finance and human resource management departments?
Cases in collective bargaining and industrial relations : What are statutorily protected employee organizations under the Act? what standards does the NLRB apply to detemine weather a group is an employee organizations for purposes of the act? What are the standards of the NLRB apploes to determine if emplo..

Reviews

Write a Review

Basic Statistics Questions & Answers

  Describe how animals and humans experience positive emotions

Describes how animals and humans experience positive emotions and interact with others and with their surroundings

  Which of the following statements are true if the value of

which of the following statements are true if the value of the test statistic for a two-tailed z test is z -1.56?a.

  Consider the following joint discrete probability mass

consider the following joint discrete probability mass function pmfpxy 0.1 for xy 11 21 12 and 220.2

  A biologist has found that 40 of all brown bears are

a biologist has found that 40 of all brown bears are infected with trichinosis. 10 brown bears are tested for

  In fact the contents vary according to a normal

q1. find the area under the standard normal curve from z 0 to z 0.74.q2. find the area under the standard normal curve

  Calculating the confidence interval using the given data

For a two-tailed test of hypothesis (.01 significance level) to determine if there is a difference in the population means, the degrees of freedom are

  Find the confidence level of interval

Based on these results a confidence interval extending from 5.96 to 6.16 was calculated for the population mean. Find the confidence level of this interval.

  Calculate the screw torque required to raise the load and

a screw jack carries a 5 kn load. it has an m50 times 4 mm thread with a mean diameter of 47.4 mm. calculate the screw

  Finding test statistics and its two-sided p-value

Find out the test statistic s and its two-sided P -value. Do data give good evidence that population mean is not zero?

  Derive a chi-square with six degrees of freedom

After testing whether social class and welfare spending were related, you derive a chi-square (obtained) of 17.64, with 6 degrees of freedom. If alpha is set at 0.01, what is your conclusion and interpretation?

  Was the sample result different from the usual pattern

At the 0.10 significance level was the sample result different from the usual pattern? Show how to plug this in megastat and if it is chi square or anova.

  Test if the purchase behaviour is independent of the sales

some sales representatives want to determine which approach would result in more sales for a manufacturing product. the

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd