Son of Stuxnet could usher in a new chapter in cyber warfare

I wrote a year ago that Stuxnet demonstrated the difficulties and dangers of offensive cyber warfare. The weapons are too difficult to control to make them effective tools for legitimate warfare.

I have changed my opinion somewhat since then. Yes, there have been nearly 50,000 reported infections by the worm outside of the apparent targets in Iranian uranium processing plants, but its apparent success in disrupting those processors without resorting to bombs or bullets and lack of serious collateral damage from the unplanned infections makes it hard to argue with the fact that Stuxnet worked.

Related coverage:

Duqu is no 'hydrogen bomb,' but is part of the new cyber threat

But the arrival of Son of Stuxnet is a serious reminder that sophisticated malware is a dangerous commodity. Like a bomb, whether it is a threat or a defense depends on who controls it. And the public has no idea who is behind Duqu.

Duqu, discovered in the wild in October, appears to share genetic material with the groundbreaking Stuxnet worm, which tells us a little something about its authors, although the new worm appears to be a tool for espionage rather than a weapon.

“Duqu is not Stuxnet, but its structure and design philosophy are very similar to those of Stuxnet,” an academic research paper published by Symantec concluded. “At this point in time, we do not know more about their relationship, but we believe that the creator of Duqu had access to the source code of Stuxnet.”

Symantec researchers characterized Duqu as a “precursor to the next Stuxnet” and said that it appears to be conducting research and reconnaissance operations against targets. “The attackers intend to use this capability to gather intelligence from a private entity to aid future attacks on a third party.”

Stuxnet is a serious piece of malware. By all accounts it is the product of a well-financed team that had the time and resources to gather detailed intelligence about its target and craft a complex program to seek it out, observe it and sabotage it. These developers are likely to have kept close tabs on their source code, and the logical assumption is that the authors of Duqu, if not the same, are at least cooperating with the Stuxnet authors.

If Duqu is gathering information in preparation for future attacks, its targets should tell us something about who released it. The original Stuxnet specifically targeted Iranian facilities, leading to the widespread assumption that it was created by the United States or Israel, or maybe both. So far, little information has been released about the distribution of Duqu infections. And given the propensity of worms to spread, this might not tell us much about who it is intended to spy on.

Although offensive cyber warfare clearly is possible and might even be a responsible way to conduct military operations, Stuxnet and Son still illustrate the dangers of this new military domain.

“Whoever did Stuxnet should have learned a big lesson from it,” former presidential adviser Richard Clarke said in a recent interview. Without an effective way for its controllers to kill it, it inevitably will be exposed, becoming a double-edged sword.

Cyber weapons can spread like land mines, and when used as espionage tools it is likely that they eventually will be detected and analyzed by researchers, eventually limiting their effectiveness and possibly becoming an embarrassment to the owners. All of which means that in cyber war, we should continue to focus heavily on a robust defense.

inside gcn

  • security in the cloud (ShutterStock image)

    Cloud security is the agency’s responsibility

Reader Comments

Tue, Nov 8, 2011

can't see any comments

Tue, Nov 8, 2011

We in the US keep upping our cyber defense ante like the Russians did in the blood and bullets world until they finally pulled out. Our investment in cyber weighs heavily, but how heavily. Our resources are not squandered on cyber defense but they are drained away from other areas of investment. Could this be our adversaries' goal; to decrement advancement in other areas in order to pull ahead of us? There may be no good answer for this and I seriously doubt blood and bullets will be spent defending our nation from cyber attack, no matter how positively identified has been the attacker. Stuxnet and son are no doubt this moment under disection by professionals who could be innovating instead of reverse engineering. We may be effective in defending our cyber terrain but we are not gaining ground on national cyber objectives as quickly as we should.

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group