Indonesia recorded the second highest country in the world who are infected Stuxnet, malware (malicious software), aka the malicious program types worm which was rampant in the world today. Thus the results of analysis of Kaspersky Lab, a leading developer of security solutions based in Russia.
Stuxnet, a specific Windows computer worm was first discovered in June 2010 by a security company who came from Belarus. The worm became famous because it is the first worm to spy on and reprogram the industrial system. Lately, Stuxnet worm attacks have led to much speculation and discussion about the intent and purpose, origin, and - most importantly - the identity of the attacker and the target.
Kaspersky Lab has not seen enough evidence to identify the attacker or the target, but Kaspersky can confirm that this is the only sophisticated malware attack that is supported by a large fee, attacking team with high expertise and knowledge of SCADA technology is good.
"These attacks can be used as a tool for cyber warfare or cyber terrorism or sabotage a virtual world that depend on the source of attacks and targets. So far what we've seen about Stuxnet more likely to be used as a tool to conduct sabotage. Kaspersky Lab no in a position to comment on the political side of this attack, "said Eugene Kaspersky, Co-founder and Chief Executive Officer of Kaspersky Lab in its press release last weekend.
Based on the geographic spread of Stuxnet; Iran, India and Indonesia leading the way in terms of infection so far. However, the epidemic Stuxnet (like other epidemics) are not static; this worm spreads continuously, and while some systems remain infected, many of these systems have been cleaned. The most vulnerable country is India's attack with the number reaching 86 258 units of computer attacks. Indonesia in pisisi second with 34,138 victims computer.
The main purpose of this worm is to access the Simatic WinCC SCADA, which is used as an industrial control system and the duty to supervise and control the industrial, infrastructure, or facilities-based processes. Similar systems are widely used in oil refineries, power plants, large communication systems, airports, shipping, and even military installations globally.
Thorough knowledge of SCADA technology, the sophistication of attacks in layers, the use of several zero-day vulnerabilities and valid certificate brings us to the understanding that Stuxnet created by a team of professionals with expertise in highly skilled and have the resources and financial support large. Targeted attacks and regions plagued by this worm (especially Iran), implying that they are not the usual group of cyber criminals. Furthermore, Kaspersky security expert who analyzed the worm code confirms that the main goal Stuxnet not to spy on the infected system, but to conduct sabotage.
Researchers at Kaspersky Lab found that the worm exploits two of the four zero-day vulnerabilities that have been reported directly to Microsoft. Analysts Kaspersky has worked closely with Microsoft to ensure the smooth running of the launch of the patch, and ensuring customers are protected and to obtain information about the attack. All products Kaspersky Lab has managed to detect and neutralize Worm.Win32.Stuxnet. Indonesia Today