![]() ![]() Network file sharing: The malware would copy and execute itself. Server Message Block (SMB): Stuxnet used SMB to provide shared access to files, printers, and other devices by benefiting of a vulnerability in the Microsoft Windows Server Service. LANs: The Stuxnet malware would utilize security breaches in the Windows Print Spooler. Removable drives: The malware would take advantage of the auto-execution vulnerability. The Stuxnet was really dangerous because it could self-replicate and spread across multiple systems through many means, such as: ![]() The US Department of Homeland Security's (DHS) Industrial Control Systems Cyber Emergency Team ( ICS-CERT) issued multiple guidelines on how to defend against the Stuxnet malware, which also infected systems in the US. The Stuxnet malware was a wake-up call to SCADA systems around the world because it was considered the first known threat to target specifically SCADA systems in order to control networks. It infected control system networks and it was presumed by some to have damaged as many as one-fifth of the nuclear power centrifuges in Iran. In 2010, Stuxnet was the one of the most complex malware known. ![]() Download the SCADA Tutorial white paper Stuxnet
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |