Cyber warfare gains in sophistication

Assignment Help Basic Statistics
Reference no: EM131040158

Cyber warfare Gains in Sophistication

Stuxnet and more recent types of malicious software, or malware- particularly Duqu, Flame, and Gauss-herald a frightening new era in cyberwarfare. China, Russia, the United States, and other nations have been engaging in cyberw arfare for several years, and these four types of malware represent a major technological escalation. All four types are so sophisticated and complex that they appear to have been developed by nation states for use in ongoing (as of mid-2013) cyberespionage operations. Stuxnet, first launched in June 2009 and discovered in July 2010, is malware that targets industrial supervisory control and data acquisition systems. In particular, Stuxnet targets Siemens SCADA systems that are configured to control and monitor specific industrial processes.

In fact, security experts around the world suspect that the malware's target was the uranium enrichment industrial infrastructure in Iran. On November 29, 2010, Iran confi rmed that its nuclear program had been damaged by Stuxnet. The malware may have damaged Iran's nuclear facilities in Natanz and eventually delayed the start-up of the Bushehr nuclear power plant. Whoever constructed Stuxnet must have possessed an indepth knowledge of nuclear industrial processes.

Stuxnet appears to have impaired Iran's computer-controlled uranium centrifuges, which mysteriously lost 30 percent of their production capacity, thereby delaying any plans to produce a nuclear weapon. After infecting Iran's nuclear facilities, Stuxnet spread rapidly throughout the country, affecting more than 30,000 Internet Protocol addresses. This problem was compounded by the malware's ability to mutate, meaning that new versions of Stuxnet continued to spread. Stuxnet is believed (but not known) to have been written through a partnership between Israel and the United States. Duqu is a type of malware discovered in 2011 on computers in Iran, Sudan, and other countries that was designed to steal documents and other data from infected computers. Duqu appeared to gather intelligence specifically about the design of SCADA systems.

The malware does not actually cause damage to infected computers; rather, it gathers information required for future attacks. Duqu creates a back door into computer systems that remains open for only 36 days, at which time the malware deletes itself. The reason for this short time period is probably to limit discovery. Another sophisticated type of malware, called Flame, has been detected infecting systems in Iran, Israel, Palestine, Sudan, Lebanon, Saudi Arabia, and Egypt. Flame was officially discovered by Kaspersky Lab (www.kaspersky.com) in 2012 when the United Nations International Telecommunications Union asked the fi rm to look into reports that computers belonging to the Iranian Oil Ministry and the Iranian National Oil Company had been infected with malware that was stealing and then deleting information from infected systems. Although Flame has both a different purpose and composition than Stuxnet and it appears to have been written by different programmers, its complexity, the geographic scope of its infections, and its behavior strongly indicate that it is related to Stuxnet. Flame appears to be designed primarily to spy on the users of infected computers and steal data from them, including documents, recorded conversations, and keystrokes. Flame has several cyberespionage functions. It turns on the internal microphone of an infected computer to secretly record conversations that occur either over Skype or in the computer's vicinity; it scans for Bluetooth-enabled devices in the vicinity of an infected computer to gather names and phone contacts from the contacts folder; it captures and stores frequent screenshots of activity on infected computers, such as instant messaging and e-mail communications; and it opens a backdoor to infected systems.

Flame does not replicate automatically by itself. The spreading mechanisms are turned off by default and must be switched on by the attackers before the malware will spread. This feature is likely intended to control the spread of the malware and to decrease the likelihood that it will be detected. Another type of malware, called Gauss, is closely related to Flame and Stuxnet. Gauss blends cyber-surveillance with an online banking Trojan horse. It can steal access credentials for various online banking systems and payment methods, as well as browser history, social networking and instant messaging information, and passwords. It can also intercept cookies from PayPal, Citibank, MasterCard, American Express, Visa, eBay, Gmail, Hotmail, Yahoo!, Facebook, Amazon, and some Middle Eastern banks. Gauss appears to target Lebanese banks as well as Citibank and PayPal, according to Kaspersky Lab. At the time of this writing (mid-2013), Gauss had infected some 2,500 systems in 25 countries, with the majority of infected computers located in Lebanon. Like Flame and Duqu, Gauss is programmed with a built-in time-to-live.

Once that time limit is reached, Gauss deletes itself completely from an infected system. Unfortunately, the techniques used in sophisticated, nationbacked malware are trickling down to less-skilled programmers who target regular Web users and their online accounts or credit card details. As a result, we are all at greater risk from cybercriminals. Sources:

Questions
1.Discuss the implications of the precisely targeted nature of the Stuxnet, Duqu, Flame, and Gauss attacks.
2. Analyze the statement: "Nations use malware such as Stuxnet, Duqu, Flame, and Gauss when their only alternative is to go to war."
3.Discuss the implications that these four types of malware have for all of us

Reference no: EM131040158

Questions Cloud

Taxable income for a single person : What is the amount of taxes paid for 2014 for $65,000 of taxable income for a single person? (rounded to the nearest dollar and NO dollar sign $ or comma needed)
Statutorily protected employee organizations under the act : What are statutorily protected employee organizations under the Act? What standards does the NLRB apply to determine weather a group is an employee organizations for purposes of the act?
What is the marginal tax rate : What is the marginal tax rate for 2014 for $65,000 of taxable income for a single person?
How should the terminal value or going concern be estimated : What is the total value of AirThread before considering any synergies? What is the value of AirThread, assuming Ms. Zhang's estimates for synergies are accurate?
Cyber warfare gains in sophistication : Stuxnet and more recent types of malicious software, or malware- particularly Duqu, Flame, and Gauss-herald a frightening new era in cyberwarfare. China, Russia, the United States, and other nations have been engaging in cyberw arfare for several ..
Use database normalization techniques to split the flat file : Import and Structure Data - Use the provided data sets to import tables into a blank access database and Use database normalization techniques to split the flat file databases into a relational database
Who is harmed by the library project : Who is harmed by the Library Project? Make a list of harmed groups, and for each group, try to devise a solution that would eliminate or lessen the harm. Why is Google pursuing the Library Project? What is in it for Google? Make a list of benefits to..
Question regarding the marketing operations : How are the four major functions of management (planning,organising, leading and controlling) are related to the marketing operations, finance and human resource management departments?
Cases in collective bargaining and industrial relations : What are statutorily protected employee organizations under the Act? what standards does the NLRB apply to detemine weather a group is an employee organizations for purposes of the act? What are the standards of the NLRB apploes to determine if emplo..

Reviews

Write a Review

Basic Statistics Questions & Answers

  Statistics-probability assignment

MATH1550H: Assignment:  Question:  A word is selected at random from the following poem of Persian poet and mathematician Omar Khayyam (1048-1131), translated by English poet Edward Fitzgerald (1808-1883). Find the expected value of the length of th..

  What is the least number

MATH1550H: Assignment:  Question:     what is the least number of applicants that should be interviewed so as to have at least 50% chance of finding one such secretary?

  Determine the value of k

MATH1550H: Assignment:  Question:     Experience shows that X, the number of customers entering a post office during any period of time t, is a random variable the probability mass function of which is of the form

  What is the probability

MATH1550H: Assignment:Questions: (Genetics) What is the probability that at most two of the offspring are aa?

  Binomial distributions

MATH1550H: Assignment:  Questions:  Let’s assume the department of Mathematics of Trent University has 11 faculty members. For i = 0; 1; 2; 3; find pi, the probability that i of them were born on Canada Day using the binomial distributions.

  Caselet on mcdonald’s vs. burger king - waiting time

Caselet on McDonald’s vs. Burger King - Waiting time

  Generate descriptive statistics

Generate descriptive statistics. Create a stem-and-leaf plot of the data and box plot of the data.

  Sampling variability and standard error

Problems on Sampling Variability and Standard Error and Confidence Intervals

  Estimate the population mean

Estimate the population mean

  Conduct a marketing experiment

Conduct a marketing experiment in which students are to taste one of two different brands of soft drink

  Find out the probability

Find out the probability

  Linear programming models

LINEAR PROGRAMMING MODELS

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd