RSA 2013: Stuxnet Attacks On Iran May Have Been Active In 2005

Symantec today claimed to have found the oldest sample of the super-sophisticated malware Stuxnet, which eventually disrupted Iranium nuclear activities, and it may have first been pushed out as early as 2005.

Calling it Stuxnet 0.5, Francis deSouza, the security giant’s president of products and services, took to the stage this morning at RSA 2013 to announce the findings. The malware was believed to have been built on the ‘Flamer’ platform, used to create the Flame surveillance software, which also targeted Iranian systems. Both Flame and Stuxnet were believed to have been the work of the US and Israel governments.

“Analysis of this code reveals the latest discovery to be version 0.5 and that it was in operation between 2007 and 2009 with indications that it, or even earlier variants of it, were in operation as early as 2005,” a blog post from Symantec read. “Until now Stuxnet was believed to be a project developed by people with access to Flamer components and not necessarily the whole Flamer platform source code.

“As with version 1.x, Stuxnet 0.5 is a complicated and sophisticated piece of malware requiring a similar level of skill and effort to produce.”

Yet Stuxnet 0.5 used an entirely different attack mechanism to its successors, which managed to make centrifuges used for uranium enrichment spin out of control. The eventual aim of the malware was to close valves that fed uranium hexafluoride gas into the centrifuges, damaging them and the uranium enrichment system as a whole. It did some incredibly smart stuff before delivering the payload, however.

“The code will take snapshots of the normal running state of the system, and then replay normal operating values during an attack so that the operators are unaware that the system is not operating normally,” Symantec noted. “It will also prevent modification to the valve states in case the operator tries to change any settings during the course of an attack cycle.”

The old version of Stuxnet was also able to analyse the systems it was sitting on, profiling all the relevant devices it sought to disrupt.

It remains unclear if the attempts to close off valves were successful, before strategy was shifted. There remain a number of dormant infections, the majority of which reside in Iran.

Below is Symantec’s infographic on the development of Stuxnet 0.5:

Are you a security expert? Try our quiz!

Thomas Brewster

Tom Brewster is TechWeek Europe's Security Correspondent. He has also been named BT Information Security Journalist of the Year in 2012 and 2013.

Recent Posts

Polestar Benefits From Targetting Disgruntled Tesla Owners – Report

Executive at Chinese owned Swedish EV maker Polestar admits targetting fed up Tesla owners with…

2 hours ago

OpenAI Countersues Elon Musk, Citing Interference

Escalation of feud between Sam Altman and Elon Musk, after OpenAI confirms it is now…

4 hours ago

AI To Drive Data Centre Energy Demand

Report from International Energy Agency (IEA) warns AI is set to drive surging electricity demand…

6 hours ago

PC Shipments Grow In Q1 Amid Tariff Worries

Shipments of personal computers grew in the first quarter, IDC and Canalys report, amid concern…

6 hours ago

Amazon Delays Project Kuiper Launch Amid Bad Weather

First launch of Amazon's Project Kuiper internet satellites pushed back amid “stubborn” cloud cover, heavy…

9 hours ago

Apple Airlifts 600 Tons Of iPhones From India, Amid Trump Tariff Chaos

As Trump eases his global tariffs, but ramps up China's input duty, Apple reportedly airlifts…

10 hours ago