stuxnet

'Twas a very mobile Christmas (week in review)

Android and iOS devices were apparently popular gifts this Christmas -- more popular than ever before.

Device activations soared from their daily December average of 4 million to 17.4 million on Christmas Day, a 332 percent increase, according to analytics firm Flurry. That's more than double the 6.8 million devices activated on Christmas last year, the previous single-day record holder. And in a first, more tablets were activated on Christmas this year than phones. Apple tablets dominated the category, but the Kindle Fire HD 7-inch made its strongest showing ever.

iPhone and iPad app downloads jumped 87 percentRead more

Stuxnet attacks Iran again, reports say

An Iranian news agency says the country successfully fended off yet another attack by the Stuxnet worm, according to reports.

The cyberattack allegedly targeted a power plant and other sites in southern Iran over the fall, the BBC and the Associated Press reported today.

Discovered in June 2010, Stuxnet is believed to be the first malware targeted specifically at critical infrastructure systems. It's thought to have been designed to shut down centrifuges at Iran's Natanz uranium enrichment plant, where stoppages and other problems reportedly occurred around that time. The sophisticated worm spreads via USB drives and through four … Read more

Crippling Stuxnet virus infected Chevron's network too

Stuxnet, the sophisticated computer virus that attacked a nuclear enrichment facility in Iran two years ago, also inadvertently infected Chevron's network.

Reportedly created by the U.S. and Israel, the highly destructive worm was designed to infect Iran's Natanz nuclear facility. Rather than steal data, Stuxnet left a back door meant to be accessed remotely to allow outsiders to stealthily knock the facility offline and at least temporarily cripple Iran's nuclear program.

The oil giant discovered the malware in July 2010 after the virus escaped from its intended target, Mark Koelmel, Chevron's general manager of the … Read more

A who's who of Mideast-targeted malware

What's up with all the malware aimed at the Middle East?

For the second time in two weeks a virus outbreak has been reported at an energy company in that region. Qatari liquified natural gas producer RasGas said its corporate network and Web site were down after getting hit by a virus on Monday. Earlier this week the Saudi Aramco oil company confirmed that its network was hit by a virus two weeks ago, shutting down 30,000 workstations. Neither company identified the virus, but in at least one of the cases it is believed to be malware known … Read more

Senators call for probe of electric grid cybersecurity

Two U.S. senators are calling for a federal investigation of the power grid's potential cybersecurity vulnerabilities after a CNET article last month raised security concerns.

The request for a probe comes from Sens. Joseph Lieberman (I-CT), the chairman of the Senate Homeland Security Committee, and Susan Collins (R-ME), the panel's senior Republican, who warned that lapses "could undermine part of the security system protecting our grid."

They sent a letter yesterday to the Federal Energy Regulatory Commission asking for an "expeditious comprehensive investigation into these allegations," which deal with digital signatures the industry … Read more

Lock down USB drives in Windows with USB Disk Manager

USB drives are convenient for storage and for transferring data to other computers. This convenience also makes them a great delivery system for malware. If you're comfortable with the Windows Registry or know how to set Group Policies, you can lock down your PC's USB drives. A much simpler way is by using USB Disk Manager.

USB Disk Manager is a small Windows program that can help you manage the permissions of USB drives. The portable app doesn't need to be installed and can be run from a folder on your hard drive or from a USB … Read more

Disaster awaits U.S. power grid as cybersecurity lags

Security technology used by U.S. electric utilities is flawed and could increase the odds of computer intrusions or sabotage, the chairman of an industry standards group warns.

Jesse Hurley, co-chair of the North American Energy Standards Board's Critical Infrastructure Committee, says the mechanism for creating digital signatures for authentication is insufficiently secure because not enough is being done to verify identities and some companies are attempting to weaken standards to fit their business models.

"These certificates protect access to control systems," Hurley told CNET. "They protect access to a $400 billion market. They protect access … Read more

Shared code indicates Flame, Stuxnet creators worked together

A chunk of code used in both Stuxnet and Flame shows that the developers of the two pieces of malware shared their work, researchers at Kaspersky Lab said today.

There were two independent developer teams, with Flame development preceding Stuxnet and each team developing its own code platform since 2007-2008 at the latest, the researchers said. Both projects were state-sponsored, and Stuxnet was specifically designed to sabotage Iran's nuclear program, experts believe.

In addition, a previously undiscovered elevation-of-privilege Windows exploit is in Stuxnet.A, an early variant of the malware, Roel Schouwenberg, senior researcher at Kaspersky Lab, said in … Read more

Behind the 'Flame' malware spying on Mideast computers (FAQ)

The Flame worm that has targeted computers in the Middle East is being called "the most sophisticated cyberweapon yet unleashed" by Kaspersky Lab researchers who discovered it. Lurking on computers for at least five years, the malware has the ability to steal data, eavesdrop on conversations, and take screen captures of instant message exchanges, making it dangerous to any victim. But a possible link to malware found on computers in Iran's oil sector has experts saying it's got to be the work of a nation-state.

CNET talked with Roel Schouwenberg, senior researcher at Kaspersky, the company … Read more

Flame: A glimpse into the future of war

If you roll your eyes at the term "Digital Pearl Harbor," you have my sympathy. We've been warned about the specter of an enemy attack via bits and bytes for several decades, with no real evidence that this is a realistic possibility and not mere hype.

Still, a new worm that's been spying on infected computers in the Middle East has been called a "cyberweapon," and while we're not talking outright combat, it's clear that malware is increasingly playing a part in geopolitical diplomacy and conflict.

This week brought news of not … Read more