Stuxnet facts for kids
Stuxnet is cyber weapon and computer worm. It was used to sabotage Iran’s nuclear program with what would seem like a long series of unfortunate accidents. It was first released in 2006. It became known only after the release of the second version. In 2010, an error in the code led the virus to spread outside the test labs and infect computers around the world.
Stuxnet targets PLCs. They control machinery on factory assembly lines, amusement rides, or centrifuges for separating nuclear material. Stuxnet works by targeting machines using the Microsoft Windows operating system and networks. It then looks for Siemens Step7 software. Stuxnet reportedly compromised Iranian PLCs, collecting information on industrial systems and causing the fast-spinning centrifuges to tear themselves apart. Stuxnet reportedly ruined almost one-fifth of Iran's nuclear centrifuges.
Stuxnet is typically introduced to the target environment via an infected USB flash drive. The worm then spreads across the network, scanning for Siemens Step7 software on computers controlling a PLC. If it doesn't find a target, Stuxnet becomes dormant inside the computer.
Stuxnet is special for different reasons:
- It used flaws of the operating system Microsoft Windows which were not known to many people at the time.
- It used stolen digital signatures to install the rootkit.
- The authors had in-depth knowledge of the process visualization system WinCC, which is used to monitor and control technical processes, using the Simatic S7 industrial controller
- It uses another rootkit to infect the computers which ruin the control and monitoring software for the industrial board
Even though it targeted PLCs only very few were infected. The software is written to infect a specific set of PLC, with well-defined modules. In the case of a personal computer, it will infect any computer running the right software.
Images for kids
Stuxnet Facts for Kids. Kiddle Encyclopedia.