- Test & Measurement
-
Analyzers
-
Oscilloscope
-
Meters
-
Generators
-
DC Power Supply
-
Optical Communications
-
Other Test Equipment
-
Accessories
-
Probes
-
Software
-
AC Power Sources
-
Accessory Kits
-
Amplifiers
-
Antenna
- View All Categories >>
-
- Semiconductor & PCB
-
Front End
-
Back End
-
PC Board Assembly
- View All Categories >>
-
- Surplus & Liquidation
- Computers & Electronics
- Construction
-
Aggregate Equipment
-
Air Compressors
-
Asphalt / Pavers / Concrete Equipment
-
Compactors
-
Cranes
-
Crawler Loaders
-
Dozers
-
Drills
-
Dumpers
-
Excavators
-
Forestry Equipment
-
Forklifts
-
Generator Sets
-
Lifts
- View All Categories >>
-
- Biotech & Life Sciences
-
Biotechnology
-
Cell Counters
-
DNA Sequencers
-
DNA Synthesizers
-
Densitometers
-
Electrophoresis
-
Electroporation
-
Fermenters / Bioreactors
-
Flow Cytometers
-
Gel Dryer
-
Hybridization Ovens/Incubators
-
Immunoassay Systems
-
Microarray Scanners
-
Microplate Dispensers
- View All Categories >>
-
- Machinery
-
Abrasives
-
Air Compressors
-
Air Cooling & Heating Equipment
-
Bar Machinery
-
Bending & Forming Equipment
-
Boring Mills
-
Broaching Machines & Keyseaters
-
CNC Machinery
-
Chemical & Processing Equipment
-
Chip, Recycling & Scrap Equipment
-
Cleaning, Painting & Washing Equipment
-
Coil Processing Equipment
-
Construction Equipment
-
Die Casting Machines
- View All Categories >>
-
- Commercial Trucks
-
Heavy Duty Trucks
-
Medium Duty Trucks
-
Light Duty Trucks
-
Trailers
- View All Categories >>
-
- Chemical Equipment
-
AGITATORS
-
AIR FIN COOLERS
-
BLENDERS
-
BLOW MOLDERS
-
BLOWERS
-
BOILERS
-
CENTRIFUGES
-
COLUMNS
-
COLUMNS DBL DIA
-
COMPLETE PLANTS
-
COMPRESSORS
-
CONVERTERS
-
CONVEYORS
-
COOLING TOWERS
- View All Categories >>
-
- Apparel and Textile
-
Textile Machinery
-
Apparel & Textile Machinery Parts
-
Apparel Machinery
-
Home Textile Product Machinery
-
Apparel Accessories Machinery
-
Leather Production Machinery
- View All Categories >>
-
- Medical Equipment
-
Beds, Stretchers and Furniture
-
Cardiology
-
Consumables and Supplies
-
Cosmetic
-
Defibrillator
-
Dental
-
EMS/Rescue
-
Endoscopy
-
Exam Room
-
Homecare/Rehab
-
Imaging
-
Laboratory
-
Monitors/ICU/CCU
-
Neonatal
- View All Categories >>
-
- Printing Equipment
-
Press
-
Prepress
-
Postpress
-
Guillotines
-
Packaging
-
Misc
-
Flexo Printing
-
Web offset
-
Screen Printing
-
Package deals
-
Spare Parts
- View All Categories >>
-
- Packaging Equipment
-
Accumulators
-
Bag Dumps
-
Bag Sealers
-
Bagging Machines
-
Blister Packaging Lines
-
Blister Packers
-
Blister Sealers
-
Blow Fill Seal
-
Bottle Rinsers
-
Canning Equipment
-
Cap Sorters
-
Cappers
-
Cartoners
-
Case Erectors
- View All Categories >>
-
Inside the World's Most Dangerous Industrial Cyber Weapon
04/09/2013 23:08:16
Using reverse comprehensive engineering, a team at cyber security firm Symantec found that Stuxnet 0.5, the older version of the virus widely considered to be a joint effort between Israel and the U.S., was actually first deployed in 2007, several years before it was detected in 2010. Moreover, its virus codes trace back to 2005. This original version of Stuxnet infiltrated multitudes of computer networks and targeted industrial control systems.
Stuxnet 0.5 had the ability to cause damage while going unnoticed by facility operators. It also had explosive potential – Stuxnet coding was able to shut gas valves inside Natanz, part of Iran’s nuclear enrichment system. The shutdown had dangerous consequences, as built-up pressure nearly led to an explosion and caused serious damage to equipment.
While Stuxnet 0.5 was a potent weapon, it didn’t fulfill the attacker’s goals, and it eventually evolved into the final version of Stuxnet, a virus that was used to alter the speed of Iranian centrifuges. According to Symantec, the discovery of earlier versions of the cyber weapon helped researchers understand Stuxnet’s goals, but other versions remain undiscovered. The firm admits that obtaining these other samples may prove impossible.
So where did Stuxnet originate?
Federal officials recently revealed that the U.S. initiated a complex cyber weapon development program to prevent Iran from acquiring nuclear weapons when President George W. Bush was in office. Other reports claim that President Barack Obama ordered the Stuxnet attack on Iran’s nuclear enrichment facilities.
“The [Symantec] report provides even more concrete evidence that the U.S. has been actively trying to derail the Iranian nuclear program since it was restarted under President Mahmoud Ahmadinejad’s reign,” John Bumgarner, chief technology officer of the U.S. Cyber Consequences Unit, an independent non-profit research institute, told Reuters.
Other dangerous cyber weapons continue to proliferate. After Stuxnet was discovered, engineers found similar viruses with the names Duqu, Gauss, and Flame. The same developers who created Stuxnet 0.5 also developed Flame, Ars Technica reports. One of Flame’s key characteristics is that it is able to infiltrate a machine when a user updates the operating system.
Sophisticated and ever-evolving cyber weapons put national infrastructure, operating factories, power plants, and other industrial systems at risk, while incurring a high cost. According to the Ponemon Institute, the annualized cost of cyber crime in 2012 among a sample of 56 organizations ranged from $1.4 million to $46 million per company.
Cyber attacks have impacted a range of industries and many U.S. companies. Last year, Secretary of Defense Leon E. Panetta drew attention to several attacks on large U.S. financial institutions, focusing on a virus named Shamoon, which was responsible for the “largest destructive attack that the private sector has seen to date.”
Shamoon also infected computers in the Saudi Arabian state oil company Aramaco. That attack destroyed more than 30,000 computers. Soon afterward, there was a similar incident at RasGas of Qatar, another energy company.
Panetta announced that the Department of Homeland Security, the F.B.I., and U.S. intelligence agencies are increasing their efforts to shield the U.S. from cyber threats, and that the Department of Defense, with support from the National Security Agency, has developed the world’s most sophisticated system for detecting cyber attackers and intruders.
Yet he also warned about the damage that cyber weapons can cause across the nation, and explained the potential devastation of a major strike on U.S. businesses and infrastructure.
“We know that foreign cyber actors are probing America’s critical infrastructure networks. They are targeting the computer control systems that operate chemical, electricity, and water plants and those that guide transportation throughout this country,” Panetta said. “The collective result of these kinds of attacks could be a cyber Pearl Harbor; an attack that would cause physical destruction and the loss of life. In fact, it would paralyze and shock the nation and create a new, profound sense of vulnerability.”
