IDG News Service - Trend Micro has released a tool that administrators can use to scan dozens of computers at a time for Stuxnet, the malicious software program that has raised widespread concern for its targeting of industrial systems made by Siemens.
Trend Micro's security products will detect Stuxnet, but the company decided to build a tool that would let other people not using its products detect the malware, said David Sancho, a senior researcher with Trend Micro. Administrators may also want to run the tool to verify that their security software is indeed detecting and removing the program, he said.
The Stuxnet tool can scan all computers within a specific Internet Protocol range. To find the malware, the tool transmits spoofed packets that are similar to the packets sent by the two or three Stuxnet variants. If Stuxnet is present, it will respond to the spoofed packets.
Stuxnet is a worm that was designed to infect Windows computers running Siemens WinCC SCADA (supervisory control and data acquisition) systems, which are used for industrial manufacturing processes.
Researchers have had a tough time figuring out exactly what Stuxnet aimed to do once it infected those systems. But in a report released by Symantec last Friday, researchers found that Stuxnet looks for frequency converter drives, which change electrical output from a power grid to a much higher frequency.
The higher frequencies are required for processing such as in uranium enrichment. The finding gives more solid backing to theories that Stuxnet was designed by a nation-state to disrupt nuclear technology development in countries such as Iran, which reported Stuxnet infections.
But while Stuxnet is highly advanced in some ways, it also had flaws. Because it is a worm, it can spread rapidly, which is part of the reason why security researchers eventually discovered it. Months after it has been discovered, Trend Micro has found that it is still spreading, particularly on computers in places such as China where there is a lower general use of security software, Sancho said.
"We see it propagating all over the place," Sancho said. "There's a lot of people who have it."
- Mobile First: Securing Information Sprawl Learn how the partnership between Box and MobileIron can help you execute a "mobile first" strategy that manages and secures both mobile apps...
- Cybersecurity Imperatives: Reinvent your Network Security The Rise of CyberSecurity
- Surescripts Case Study- Securing Keys and Certificates Surescripts implemented Venafi's Trust Protection Platform™ to secure digital keys and certificates, ensure the privacy and confidentiality of electronic clinical information for its...
- Ponemon 2014 SSH Security Vulnerability Report According to research by the Ponemon Institute, 3 out of 4 enterprises have no security controls in place for SSH which leaves organizations...
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities.
- Deep Dive into Advanced Networking and Security with Hybrid Cloud Security and networking are among the top concerns when moving workloads to the cloud. VMware vCloud® Hybrid Service™ enables you to extend your... All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!