Monday, December 17, 2012

Post 009 – CYBR 650





Iranian computers targeted by new malicious data wiper program:  Batchwiper follows the discovery of Flame and other malware targeting the region.

This newly publicized “Batchwiper” program infiltrates machines running Windows operating systems, and installs itself in the Registry of targeted computers.  It can wipe out massive amounts of data because when it executes automatically and it attacks boot partitions on hard drives.  The malware was identified, analyzed, and documented by AlienVault Labs (Goodin, D., 2012).

Hooray for AlienVault Labs.  Good job guys!

Folks, please click on the link below and read up on this Batchwiper program and avoid it:



Comments:

Hmm... Sounds like some well-crafted program from an outfit like IDF Unit 8200 partnering with some other country with lots of technical capabilities.  (Good job guys!)

Guess it makes me glad I’m not living in Iran at the moment.  I know that we have not yet seen the worst of these cyberattacks, both in intensity and sophistication.

Since the first appearance of Stuxnet, we are starting to get some idea of the capabilities and intent to use this new breed of cyberweapons .  Frankly, I am not sad to see it.  I just wish our policies were stronger to clearly indicate to the American public and to ourpotential enemies what we are capable of unleashing.

References:

AlienVault Labs. (2012). Batchwiper: Just Another Wiping Malware. Retrieved from http://labs.alienvault.com/labs/index.php/2012/batchwiper-just-another-wiping-malware/  on December 17, 2012.

Gjelten, T.  (2010).  Are 'Stuxnet' Worm Attacks Cyberwarfare? An article published at NPR.org on October 1, 2011. Retrieved from the web at http://www.npr.org/2011/09/26/140789306/security-expert-u-s-leading-force-behind-stuxnet    on December 20, 2011.

Gjelten, T.  (2010).  Stuxnet Computer Worm Has Vast Repercussions. An article published at NPR.org on October 1, 2011.  Retrieved from the web at http://www.npr.org/templates/story/story.php?storyId=130260413   on December 20, 2011.

Gjelten, T.  (2011).  Security Expert: U.S. 'Leading Force' Behind Stuxnet. An article published at NPR.org on September 26, 2011. Retrieved from the web at http://www.npr.org/2011/09/26/140789306/security-expert-u-s-leading-force-behind-stuxnet   on December 20, 2011.

Gjelten, T.  (2011).  Stuxnet Raises 'Blowback' Risk In Cyberwar. An article published at NPR.org on December 11, 2011. Retrieved from the web at http://www.npr.org/2011/11/02/141908180/stuxnet-raises-blowback-risk-in-cyberwar   on  December 20, 2011.

Goodin, D. (2012).  Iranian computers targeted by new malicious data wiper program.  Retrieved from http://arstechnica.com/security/2012/12/iranian-computers-attacked-by-new-malicious-data-wiper-program/ on December 17, 2012.

Knapp, E D. (2011). Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems. Waltham, MA: Syngress, MA.

Kramer, F. D. (ed.), et al. (2009). Cyberpower and National Security.  Washington, DC: National Defense University.
Langer, R. (2010).   Stuxnet Technical Analysis. Retrieved from the web at http://www.langner.com/en/blog/page/6/   on December 20, 2011.

Libicki, M.C. (2009). Cyberdeterrence and Cyberwar. Santa Monica, CA: Rand Corporation.

Mayday, M. (2012).  Iran Attacks US Banks in Cyber War: Attacks target three major banks, using Muslim outrage as cover.  An article published on September 22, 2012 at Poltix.Topix.com.  Retrieved from http://politix.topix.com/homepage/2214-iran-attacks-us-banks-in-cyber-war   on September 22, 2012.

Sanger, D. E. (2012). Confront and Conceal: Obama’s Secret Wars and Surprising Use of America Power.  New York, NY: Crown Publishers.

Schell, B. H., et al. (2002). The Hacking of America: Who’s Doing It, Why, and How.  Westport, CT: Quorum Press.

Slater, W. F. (2012).  The Case for Integration of Cyberwarfare and Cyberdeterrence Strategies into the U.S. CONOPS Plan to Maximize Responsible Control and Effectiveness by the U.S.  National Command Authorities.  A technical presentation published on November 18, 2012. Retrieved from http://www.billslater.com/writing/DET_630_Week_12_Writing_Assignment_Presentation_from_W_F_Slater_v1.pdf on November 18, 2012.

Slater, W. F. (2012).  The Case for Integration of Cyberwarfare and Cyberdeterrence Strategies into the U.S. CONOPS Plan to Maximize Responsible Control and Effectiveness by the U.S.  National Command Authorities.  A technical paper published on November 18, 2012. Retrieved from http://www.billslater.com/writing/DET_630_Week_12_Writing_Assignment_6_from_W_F_Slater.pdf  on November 18, 2012.

Stiennon, R. (2010). Surviving Cyber War. Lanham, MA: Government Institutes.

Technolytics. (2011). Cyber Commander's eHandbook: The Weaponry and Strategies of Digital Conflict. Purchased and downloaded from Amazon.com on April 16, 2011.

Turzanski, E. and Husick, L. (2012). “Why Cyber Pearl Harbor Won't Be Like Pearl Harbor At All...” A webinar presentation held by the Foreign Policy Research Institute (FPRI) on October 24, 2012. Retrieved from http://www.fpri.org/multimedia/2012/20121024.webinar.cyberwar.html  on October 25, 2012.

Wikipedia Commons. (2011). Stuxnet Diagram.  Retrieved from the web at http://en.wikipedia.org/wiki/File:Step7_communicating_with_plc.svg  on December 20, 2011.

Zetter, K. (2011). How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History. An article published on July 11, 2011 at Wired.com.  Retrieved from the web at http://www.wired.com/threatlevel/2011/07/how-digital-detectives-deciphered-stuxnet/all/1  on December 20, 2011.

No comments:

Post a Comment