IDG News Service - Trend Micro has released a tool that administrators can use to scan dozens of computers at a time for Stuxnet, the malicious software program that has raised widespread concern for its targeting of industrial systems made by Siemens.
Trend Micro's security products will detect Stuxnet, but the company decided to build a tool that would let other people not using its products detect the malware, said David Sancho, a senior researcher with Trend Micro. Administrators may also want to run the tool to verify that their security software is indeed detecting and removing the program, he said.
The Stuxnet tool can scan all computers within a specific Internet Protocol range. To find the malware, the tool transmits spoofed packets that are similar to the packets sent by the two or three Stuxnet variants. If Stuxnet is present, it will respond to the spoofed packets.
Stuxnet is a worm that was designed to infect Windows computers running Siemens WinCC SCADA (supervisory control and data acquisition) systems, which are used for industrial manufacturing processes.
Researchers have had a tough time figuring out exactly what Stuxnet aimed to do once it infected those systems. But in a report released by Symantec last Friday, researchers found that Stuxnet looks for frequency converter drives, which change electrical output from a power grid to a much higher frequency.
The higher frequencies are required for processing such as in uranium enrichment. The finding gives more solid backing to theories that Stuxnet was designed by a nation-state to disrupt nuclear technology development in countries such as Iran, which reported Stuxnet infections.
But while Stuxnet is highly advanced in some ways, it also had flaws. Because it is a worm, it can spread rapidly, which is part of the reason why security researchers eventually discovered it. Months after it has been discovered, Trend Micro has found that it is still spreading, particularly on computers in places such as China where there is a lower general use of security software, Sancho said.
"We see it propagating all over the place," Sancho said. "There's a lot of people who have it."
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts