Stuxnet, the powerful malware that wormed its way in and hobbled Iran's uranium enrichment efforts, infiltrated the secure networks of the nuclear program via trusted partners, newly public information reveals.
Once machines in five partner networks had been infected, Stuxnet found its way into Iran's Natanz refining plant where it force automated control machines to run uranium enrichment centrifuges at speeds that would damage them, according to a blog written by Alex Gostev, Chief Security Expert at Kaspersky Lab.
The centrifuges are necessary to create weapons-grade uranium, something the U.S. and Israel wanted to block, and both countries are considered the most likely creators of Stuxnet.
The five targeted partners were three makers of automated systems for industrial use (Foolad Technic Engineering Co., Behpajooh Co. Elec & Comp. Engineering and Control-Gostar Jahed Co.), a steel company (Mobarakeh Steel Company), a company that made products for potential military use (Neda Industrial Group), and the main manufacturer of the centrifuges (Kalaye Electric Co.).
These companies and the manner in which they were attacked give some insight into the thought process that went into ultimately compromising the Siemens gear that controlled the centrifuges.
Two of the attacked companies, Neda and Gostar, were likely used just for intelligence gathering since they were infected with a Stuxnet variant that never left the companies.
Neda was attacked only in 2009 while some of the other sites were also hit in 2010. The company's usefulness might have been to provide information about Siemens Step7 software that is used to give instructions to its programmable logic controllers the devices directing the behavior of the centrifuges, Gostev says. "[T]he capability of stealing information about Step 7 projects from infected systems was of special interest to the creators of Stuxnet," he writes.
Foolad, though, was hit twice in June 2009 and April 2010. "This persistence on the part of the Stuxnet creators may indicate that they regarded Foolad Technic Engineering Co. not only as one of the shortest paths to the worm's final target, but as an exceptionally interesting object for collecting data on Iran's industry," Gostev writes.
While it's widely believed that Stuxnet spread via infected USB sticks, in at least one case it seems that some other method was used. One Stuxnet version was created June 22, 2009 and infected a Foolad computer at 4:40 a.m. the next day, too soon for it to have been introduced via USB stick, Gostev writes. He said in an email interview that perhaps exploitation of a particular Microsoft vulnerability on the attacked machine might have been exploited.
Known as MS08-067 or CVE-2008-4250, once exploited it allows the attackers to create, read and delete files, download malware versions and install them, and to send the malware on to infect other machines.
Sign up for Computerworld eNewsletters.