SlideShare a Scribd company logo
3
Most read
8
Most read
12
Most read
Cybersecurity Case Study
STUXNET worm

Stuxnet SCADA attack, 2013

Slide 1
Stuxnet SCADA attack, 2013

Slide 2
Cyber-warfare
•

The STUXNET worm is computer malware which
is specifically designed to target industrial control
systems for equipment made by Siemens.

•

These systems are used in Iran for uranium
enrichment
–

•

Enriched uranium is required to make a nuclear bomb

The aim of the worm was to damage or destroy
controlled equipment

Stuxnet SCADA attack, 2013

Slide 3
What is a worm?
• Malware that can infect a computerbased system and autonomously
spread to other systems without user
intervention
• Unlike a virus, no need for a carrier or
any explicit user actions to spread the
worm
Stuxnet SCADA attack, 2013

Slide 4
The target of the worm

Stuxnet SCADA attack, 2013

Slide 5
The STUXNET worm
• Worm designed to affect SCADA systems and
PLC controllers for uranium enrichment
centrifuges
• Very specific targeting – only aimed at
Siemens controllers for this type of equipment
• It can spread to but does not damage other
control systems
Stuxnet SCADA attack, 2013

Slide 6
Stuxnet SCADA attack, 2013

Slide 7
Worm actions
•

Takes over operation of the centrifuge from the
SCADA controller

•

Sends control signals to PLCs managing the
equipment

•

Causes the spin speed of the centrifuges to vary
wildly, very quickly, causing extreme vibrations and
consequent damage

•

Blocks signals and alarms to control centre from
Stuxnet SCADA attack, 2013
local PLCs

Slide 8
Stuxnet penetration
•

Initially targets Windows systems used to configure
the SCADA system

•

Uses four different vulnerabilities to affect systems
–

Three of these were previously unknown

–

So if it encounters some systems where some vulnerabilities
have been fixed, it still has the potential to infect them.

–

Spread can’t be stopped by fixing a single vulnerability

Stuxnet SCADA attack, 2013

Slide 9
Stuxnet technology
• Spreads to Siemens' WinCC/PCS 7 SCADA
control software and takes over configuration
of the system.
• Uses a vulnerability in the print system to
spread from one machine to another
• Uses peer-to-peer transfer – there is no need
for systems to be connected to the Internet
Stuxnet SCADA attack, 2013

Slide 10
The myth of the air gap
• Centrifuge control systems were not
connected to the internet
• Initial infection thought to be through infected
USB drives taken into plant by unwitting
system operators
– Beware of freebies!

Stuxnet SCADA attack, 2013

Slide 11
Damage caused
•

It is thought that between 900 and 1000 centrifuges
were destroyed by the actions of Stuxnet

•

This is about 10% of the total so, if the intention was
to destroy all centrifuges, then it was not successful

•

Significant slowdown in nuclear enrichment
programme because of (a) damage and (b)
enrichment shutdown while the worms were cleared
from equipment

Stuxnet SCADA attack, 2013

Slide 12
Unproven speculations
• Because of the complexity of the worm, the
number of possible vulnerabilities that are
exploited, the access to expensive
centrifuges and the very specific targeting, it
has been suggested that this is an instance
of cyberwar by nation states against Iran

Stuxnet SCADA attack, 2013

Slide 13
Stuxnet SCADA attack, 2013

Slide 14
Unproven speculations
•

Because Stuxnet did not only affect computers in
nuclear facilities but spread beyond them by transfers
of infected PCs, a mistake was made in its
development

•

There was no intention for the worm to spread
beyond Iran

•

Other countries with serious infections include
India, Indonesia and Azerbaijhan

Stuxnet SCADA attack, 2013

Slide 15
Unproven speculations
• The Stuxnet worm is a multipurpose
worm and there are a range of versions
with different functionality in the wild
• These use the same vulnerabilities to
infect systems but they behave in
different ways
Stuxnet SCADA attack, 2013

Slide 16
• One called Duqu has significantly
affected computers, especially in Iran.
This does not damage equipment but
logs keystrokes and sends confidential
information to outside servers.

Stuxnet SCADA attack, 2013

Slide 17
Summary
• Stuxnet worm is an early instance of
cyberwarfare where SCADA controllers were
targeted
• Intended to disrupt Iran’s uranium enrichment
capability by varying rotation speeds to
damage centrifuges
• Used a range of vulnerabilities to infect
systems

Stuxnet SCADA attack, 2013

Slide 18

More Related Content

PPT
Stuxnet - Case Study
PPTX
ICS Security 101 by Sandeep Singh
PDF
SCADA Security Presentation
PDF
ICS security
PDF
Stuxnet
PDF
Cyber Attack Methodologies
PDF
Nist 800 82
PDF
Security in Cyber-Physical Systems
Stuxnet - Case Study
ICS Security 101 by Sandeep Singh
SCADA Security Presentation
ICS security
Stuxnet
Cyber Attack Methodologies
Nist 800 82
Security in Cyber-Physical Systems

What's hot (20)

PPTX
The Stuxnet Virus FINAL
PPTX
Stuxnet mass weopan of cyber attack
PPSX
Stuxnet - More then a virus.
PPT
I Heart Stuxnet
PPT
Port Scanning
PPTX
WannaCry Ransomware
PDF
The World's First Cyber Weapon - Stuxnet
PPTX
Cyber attack
PPTX
Introduction to penetration testing
PPTX
Pen Testing Explained
PPT
Stuxnet flame
PPT
Stuxnet dc9723
PPTX
Introduction to Malware Analysis
PDF
Stuxnet, a malicious computer worm
PDF
Stuxnet
PPT
Penetration Testing Basics
PDF
Network Forensic
PPTX
Malware- Types, Detection and Future
PPT
Intrusion detection system ppt
The Stuxnet Virus FINAL
Stuxnet mass weopan of cyber attack
Stuxnet - More then a virus.
I Heart Stuxnet
Port Scanning
WannaCry Ransomware
The World's First Cyber Weapon - Stuxnet
Cyber attack
Introduction to penetration testing
Pen Testing Explained
Stuxnet flame
Stuxnet dc9723
Introduction to Malware Analysis
Stuxnet, a malicious computer worm
Stuxnet
Penetration Testing Basics
Network Forensic
Malware- Types, Detection and Future
Intrusion detection system ppt
Ad

Viewers also liked (19)

PDF
Mission Critical Security in a Post-Stuxnet World Part 1
PPTX
Security case buffer overflow
PDF
(120715) #fitalk the era of cyber sabotage and warfare (case study - stuxnet)
PPTX
Architectural patterns for real-time systems
PPTX
Cybersecurity 2 cyber attacks
PPTX
TrustDavis on ethereum
PDF
Stuxnet - A weapon of the future
PDF
How stuxnet spreads – a study of infection paths in best practice systems
PPS
Conficker
PPTX
Stuxnet
PPTX
Hedly
PDF
CMIS 320 RESEARCH PAPER
PDF
Entrevista Hector Robles revista MED PLUS n99
PDF
Useful facts
PDF
CMIT 321 WEEK 2 QUIZ
PDF
Chapter 8
PDF
Mission Critical Security in a Post-Stuxnet World Part 2
PDF
A Stuxnet for Mainframes
Mission Critical Security in a Post-Stuxnet World Part 1
Security case buffer overflow
(120715) #fitalk the era of cyber sabotage and warfare (case study - stuxnet)
Architectural patterns for real-time systems
Cybersecurity 2 cyber attacks
TrustDavis on ethereum
Stuxnet - A weapon of the future
How stuxnet spreads – a study of infection paths in best practice systems
Conficker
Stuxnet
Hedly
CMIS 320 RESEARCH PAPER
Entrevista Hector Robles revista MED PLUS n99
Useful facts
CMIT 321 WEEK 2 QUIZ
Chapter 8
Mission Critical Security in a Post-Stuxnet World Part 2
A Stuxnet for Mainframes
Ad

Similar to Stuxnet worm (20)

PPTX
13-hamedHanymohamedHany-date-2025 5 10.pptx
PDF
SCADA White Paper March2012
PPTX
10-5-202510-5-202510-5-202510-5-2025.pptx
PPTX
Stuxnets
DOCX
Cyber
PDF
Optional Reading - Symantec Stuxnet Dossier
PDF
Mag-Securs No.29, 2011 - Validy: Learning from the Stuxnet Case
PDF
The stuxnet computer worm. harbinger of an emerging warfare capability
PPTX
Stuxnet
PPTX
Infrastructure Attacks - The Next generation, ESET LLC
PPTX
2012 02 14 Afcom Presentation
PDF
The story behind the stuxnet virus bruce schneier
PDF
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
PDF
Would a wanna cry make the industry wanna cry Mysore and Lear
PDF
Symantec Intelligence Quarterly Report - October - December 2010
PPTX
SIC_gr5.pptx
PDF
Digital danger zone tackling cyber security
PDF
Digital danger zone tackling cyber security
PPTX
stuxnet ppt .pptx
PDF
News letter aug 11
13-hamedHanymohamedHany-date-2025 5 10.pptx
SCADA White Paper March2012
10-5-202510-5-202510-5-202510-5-2025.pptx
Stuxnets
Cyber
Optional Reading - Symantec Stuxnet Dossier
Mag-Securs No.29, 2011 - Validy: Learning from the Stuxnet Case
The stuxnet computer worm. harbinger of an emerging warfare capability
Stuxnet
Infrastructure Attacks - The Next generation, ESET LLC
2012 02 14 Afcom Presentation
The story behind the stuxnet virus bruce schneier
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
Would a wanna cry make the industry wanna cry Mysore and Lear
Symantec Intelligence Quarterly Report - October - December 2010
SIC_gr5.pptx
Digital danger zone tackling cyber security
Digital danger zone tackling cyber security
stuxnet ppt .pptx
News letter aug 11

More from sommerville-videos (20)

PPTX
Introduction to real time software systems script
PPTX
System of systems classification
PPTX
Reuse landscape
PPTX
Introduction to systems of systems
PPTX
Scaling agile
PPTX
Agile methods for large systems
PPTX
User stories
PPTX
Agile and plan based development processes
PPTX
Fundamental software engineering activities
PPTX
Introducing Software Engineering
PPTX
Why se script
PPTX
Ariane 5 launcher failure
PPTX
Airbus Flight Control System
PPTX
Warsaw airbus accident
PPTX
Stakeholders, viewpoints and concerns
PPTX
Requirements engineering processes
PPTX
Requirements engineering challenges
PPTX
Intro to requirements eng.
PPTX
Emergent properties
PPTX
Introducing sociotechnical systems
Introduction to real time software systems script
System of systems classification
Reuse landscape
Introduction to systems of systems
Scaling agile
Agile methods for large systems
User stories
Agile and plan based development processes
Fundamental software engineering activities
Introducing Software Engineering
Why se script
Ariane 5 launcher failure
Airbus Flight Control System
Warsaw airbus accident
Stakeholders, viewpoints and concerns
Requirements engineering processes
Requirements engineering challenges
Intro to requirements eng.
Emergent properties
Introducing sociotechnical systems

Recently uploaded (20)

PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Modernizing your data center with Dell and AMD
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Big Data Technologies - Introduction.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
A Presentation on Artificial Intelligence
PDF
Chapter 3 Spatial Domain Image Processing.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Network Security Unit 5.pdf for BCA BBA.
Per capita expenditure prediction using model stacking based on satellite ima...
“AI and Expert System Decision Support & Business Intelligence Systems”
MYSQL Presentation for SQL database connectivity
Modernizing your data center with Dell and AMD
Dropbox Q2 2025 Financial Results & Investor Presentation
Big Data Technologies - Introduction.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
The AUB Centre for AI in Media Proposal.docx
Advanced methodologies resolving dimensionality complications for autism neur...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Encapsulation_ Review paper, used for researhc scholars
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
20250228 LYD VKU AI Blended-Learning.pptx
A Presentation on Artificial Intelligence
Chapter 3 Spatial Domain Image Processing.pdf

Stuxnet worm

  • 1. Cybersecurity Case Study STUXNET worm Stuxnet SCADA attack, 2013 Slide 1
  • 2. Stuxnet SCADA attack, 2013 Slide 2
  • 3. Cyber-warfare • The STUXNET worm is computer malware which is specifically designed to target industrial control systems for equipment made by Siemens. • These systems are used in Iran for uranium enrichment – • Enriched uranium is required to make a nuclear bomb The aim of the worm was to damage or destroy controlled equipment Stuxnet SCADA attack, 2013 Slide 3
  • 4. What is a worm? • Malware that can infect a computerbased system and autonomously spread to other systems without user intervention • Unlike a virus, no need for a carrier or any explicit user actions to spread the worm Stuxnet SCADA attack, 2013 Slide 4
  • 5. The target of the worm Stuxnet SCADA attack, 2013 Slide 5
  • 6. The STUXNET worm • Worm designed to affect SCADA systems and PLC controllers for uranium enrichment centrifuges • Very specific targeting – only aimed at Siemens controllers for this type of equipment • It can spread to but does not damage other control systems Stuxnet SCADA attack, 2013 Slide 6
  • 7. Stuxnet SCADA attack, 2013 Slide 7
  • 8. Worm actions • Takes over operation of the centrifuge from the SCADA controller • Sends control signals to PLCs managing the equipment • Causes the spin speed of the centrifuges to vary wildly, very quickly, causing extreme vibrations and consequent damage • Blocks signals and alarms to control centre from Stuxnet SCADA attack, 2013 local PLCs Slide 8
  • 9. Stuxnet penetration • Initially targets Windows systems used to configure the SCADA system • Uses four different vulnerabilities to affect systems – Three of these were previously unknown – So if it encounters some systems where some vulnerabilities have been fixed, it still has the potential to infect them. – Spread can’t be stopped by fixing a single vulnerability Stuxnet SCADA attack, 2013 Slide 9
  • 10. Stuxnet technology • Spreads to Siemens' WinCC/PCS 7 SCADA control software and takes over configuration of the system. • Uses a vulnerability in the print system to spread from one machine to another • Uses peer-to-peer transfer – there is no need for systems to be connected to the Internet Stuxnet SCADA attack, 2013 Slide 10
  • 11. The myth of the air gap • Centrifuge control systems were not connected to the internet • Initial infection thought to be through infected USB drives taken into plant by unwitting system operators – Beware of freebies! Stuxnet SCADA attack, 2013 Slide 11
  • 12. Damage caused • It is thought that between 900 and 1000 centrifuges were destroyed by the actions of Stuxnet • This is about 10% of the total so, if the intention was to destroy all centrifuges, then it was not successful • Significant slowdown in nuclear enrichment programme because of (a) damage and (b) enrichment shutdown while the worms were cleared from equipment Stuxnet SCADA attack, 2013 Slide 12
  • 13. Unproven speculations • Because of the complexity of the worm, the number of possible vulnerabilities that are exploited, the access to expensive centrifuges and the very specific targeting, it has been suggested that this is an instance of cyberwar by nation states against Iran Stuxnet SCADA attack, 2013 Slide 13
  • 14. Stuxnet SCADA attack, 2013 Slide 14
  • 15. Unproven speculations • Because Stuxnet did not only affect computers in nuclear facilities but spread beyond them by transfers of infected PCs, a mistake was made in its development • There was no intention for the worm to spread beyond Iran • Other countries with serious infections include India, Indonesia and Azerbaijhan Stuxnet SCADA attack, 2013 Slide 15
  • 16. Unproven speculations • The Stuxnet worm is a multipurpose worm and there are a range of versions with different functionality in the wild • These use the same vulnerabilities to infect systems but they behave in different ways Stuxnet SCADA attack, 2013 Slide 16
  • 17. • One called Duqu has significantly affected computers, especially in Iran. This does not damage equipment but logs keystrokes and sends confidential information to outside servers. Stuxnet SCADA attack, 2013 Slide 17
  • 18. Summary • Stuxnet worm is an early instance of cyberwarfare where SCADA controllers were targeted • Intended to disrupt Iran’s uranium enrichment capability by varying rotation speeds to damage centrifuges • Used a range of vulnerabilities to infect systems Stuxnet SCADA attack, 2013 Slide 18