stuxnet

McAfee: Spam down, but malware up

Spam hit a two-year low this past quarter, but malware is at an all-time high, according to McAfee's latest Threats Report.

Out today, the "McAfee Threats Report: Third Quarter 2010" (PDF) found that though spam is still high, it continued its overall decline from January, both globally and nationally. With the exception of Russia, Greece, Belarus, and Indonesia, all countries tracked by McAfee showed a drop in spam levels.

So much for the good news.

On the down side, malware has reached an all-time high, according to the security technology company, which identified an average of 60,000 new threats each day in the third quarter, almost quadrupling since 2007. For 2010 so far, McAfee has discovered 14 million unique pieces of malware, a million more than this time last year.

One of the more "sophisticated" threats that reared its head this year was the Zeus botnet, designed to steal information during banking transactions. Over the third quarter, Zeus expanded its scope by targeting mobile devices, specifically attempting to grab SMS messages sent to validate the transactions. McAfee also noticed a rise in e-mail campaigns launched to spread the botnet by sending out messages claiming to come from FedEx, the IRS, the U.S. Post Office, and other such parties.… Read more

Symantec: Stuxnet clues point to uranium enrichment target

Symantec researchers have figured out a key mystery to the Stuxnet worm code that strongly suggests it was designed to sabotage a uranium enrichment facility.

The program targets systems that have a frequency converter, which is a type of device that controls the speed of a motor, Eric Chien, technical director of Symantec Security Response, told CNET today. The malware looks for converters from either a company in Finland or Tehran, Iran.

"Stuxnet is watching these devices on the target system that is infected and checking what frequency these things are running at," looking for a range of … Read more

Urban model for cybersecurity ed: San Diego

A Slovakian antivirus company with its American headquarters in San Diego is trying to make good cybersecurity just as much a part of the local fabric as good beaches and Chargers football.

Eset launched the Securing Our eCity program with the San Diego Chamber of Commerce two years ago to offer free workshops to consumers and small businesses on how to stay safe online. Today it has become a model for similar initiatives being launched in Malaysia, Buenos Aires, and London. And it helped with the creation of the Stop Think Connect campaign launched last week as part of National … Read more

Microsoft fixes record 49 holes, including Stuxnet flaw

In a record Patch Tuesday, Microsoft released updates today for Windows, Internet Explorer, and the .NET framework that feature fixes for 49 holes, including one being exploited by the Stuxnet worm.

Microsoft recently fixed two of the four unpatched holes being used by Stuxnet to spread to Windows-based machines. The malware ultimately targets systems running software from Siemens that is used in critical infrastructure operations. Today's release plugs one (MS10-073) of the remaining two holes and the company said in a blog post that the final hole will be addressed in an upcoming security bulletin.

Meanwhile, Microsoft provided a … Read more

EU calls Stuxnet 'paradigm shift' as U.S. responds more mildly

While official U.S. response has been comparatively mild, the European Union's cybersecurity agency says Stuxnet represents a "paradigm shift" in critical infrastructure threats and that current defense philosophies need to be reconsidered.

In a statement released yesterday, Udo Helmbrecht, the executive director of ENISA (European Network and Information Security Agency), said that as a "new class and dimension of malware," Stuxnet represents a "paradigm shift."

"The attackers have invested a substantial amount of time and money to build such a complex attack tool," he said. "The fact that perpetrators … Read more

Stuxnet: Fact vs. theory

The Stuxnet worm has taken the computer security world by storm, inspiring talk of a top secret, government-sponsored cyberwar, and of a software program laden with obscure biblical references that call to mind not computer code, but "The Da Vinci Code."

Stuxnet, which first made headlines in July, (CNET FAQ here) is believed to be the first known malware that targets the controls at industrial facilities such as power plants. At the time of its discovery, the assumption was that espionage lay behind the effort, but subsequent analysis by Symantec uncovered the ability of the malware to control … Read more

RIM BlackPad today?

  Links from Monday's episode of Loaded: Research in Motion venturing off to the tablet world Stuxnet corrupted Iran's first nuclear power plant iPhone 4 on sale in China Ping, Apple's social music service, gets an update

Buzz Out Loud 1316: Robo-hairdresser meets Bionic soldier (podcast)

The movie studios seem to be encouraging piracy by launching $30 movie-streaming rentals. RIM preparing marathon Blackberry announcement. Stuxnet virus successfully infects nuclear plant computers in Iran. Who to call on Earth if you're a space alien. And a bonus: Two robot stories!

Subscribe:  iTunes (MP3)iTunes (320x180)iTunes (640x360)RSS (MP3)RSS (320x180)RSS (640x360)Read more

Stuxnet worm hits Iranian nuclear plant

Iran's official news agency said today that a sophisticated computer worm purportedly designed to disrupt power grids and other such industrial facilities had infected computers at the country's first nuclear-power plant but had not caused any serious damage.

The Stuxnet worm, which some see as heralding a new era of cyberwarfare, appeared in July and was already known to be widespread in Iran. In fact, its high concentration there, along with a delay in the opening of the Bushehr plant, led one security researcher to hypothesize that Stuxnet was created to sabotage Iran's nuclear industry.

In addition … Read more

Experts say Stuxnet worm could be state-sponsored (podcast)

The Stuxnet computer worm that may have been designed to attack a nuclear facility in Iran could have been state sponsored, according to two security experts with whom I spoke.

"We can tell by the code that it's very, very complex to the degree that this type of code had to be done, for example, by a state and not, for example, some hacker sitting in his parents basement," said Symantec security researcher Eric Chien. Chien added, however, that "there's nothing in the code that points to the particular author" or "what their … Read more