Iranian
computers targeted by new malicious data wiper program: Batchwiper
follows the discovery of Flame and other malware targeting the region.
This newly publicized “Batchwiper”
program infiltrates machines running Windows operating systems, and installs
itself in the Registry of targeted computers. It can wipe out
massive amounts of data because when it executes automatically and it attacks
boot partitions on hard drives. The malware was identified,
analyzed, and documented by AlienVault
Labs (Goodin, D., 2012).
Hooray for AlienVault Labs. Good job guys!
Folks, please click on the link below and read up on this Batchwiper program
and avoid it:
Comments:
Hmm... Sounds like some well-crafted program from an outfit like
IDF Unit 8200 partnering with some other country with lots of technical
capabilities. (Good job guys!)
Guess it makes me glad I’m not living in Iran at the
moment. I know that we have not yet seen the worst of these
cyberattacks, both in intensity and sophistication.
Since the first appearance of Stuxnet, we are starting to get
some idea of the capabilities and intent to use this new breed of cyberweapons
. Frankly, I am not sad to see it. I just wish our
policies were stronger to clearly indicate to the American public and to
ourpotential enemies what we are capable of unleashing.
References:
AlienVault Labs. (2012). Batchwiper: Just Another Wiping
Malware. Retrieved from http://labs.alienvault.com/labs/index.php/2012/batchwiper-just-another-wiping-malware/ on
December 17, 2012.
Gjelten, T. (2010). Are 'Stuxnet' Worm
Attacks Cyberwarfare? An article published at NPR.org on October 1, 2011.
Retrieved from the web at http://www.npr.org/2011/09/26/140789306/security-expert-u-s-leading-force-behind-stuxnet on
December 20, 2011.
Gjelten, T. (2010). Stuxnet Computer Worm
Has Vast Repercussions. An article published at NPR.org on October 1,
2011. Retrieved from the web at http://www.npr.org/templates/story/story.php?storyId=130260413 on
December 20, 2011.
Gjelten, T. (2011). Security Expert: U.S.
'Leading Force' Behind Stuxnet. An article published at NPR.org on September
26, 2011. Retrieved from the web at http://www.npr.org/2011/09/26/140789306/security-expert-u-s-leading-force-behind-stuxnet on
December 20, 2011.
Gjelten, T. (2011). Stuxnet Raises
'Blowback' Risk In Cyberwar. An article published at NPR.org on December 11,
2011. Retrieved from the web at http://www.npr.org/2011/11/02/141908180/stuxnet-raises-blowback-risk-in-cyberwar on December
20, 2011.
Goodin,
D. (2012). Iranian computers targeted by new malicious data wiper
program. Retrieved from http://arstechnica.com/security/2012/12/iranian-computers-attacked-by-new-malicious-data-wiper-program/ on
December 17, 2012.
Knapp, E D. (2011). Industrial Network Security: Securing
Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial
Control Systems. Waltham, MA: Syngress, MA.
Kramer, F. D. (ed.), et al. (2009). Cyberpower and National
Security. Washington, DC: National Defense University.
Langer, R. (2010). Stuxnet Technical Analysis.
Retrieved from the web at http://www.langner.com/en/blog/page/6/ on
December 20, 2011.
Libicki, M.C. (2009). Cyberdeterrence and Cyberwar. Santa
Monica, CA: Rand Corporation.
Mayday, M. (2012). Iran Attacks US Banks in Cyber
War: Attacks target three major banks, using Muslim outrage as cover. An
article published on September 22, 2012 at Poltix.Topix.com. Retrieved
from http://politix.topix.com/homepage/2214-iran-attacks-us-banks-in-cyber-war on
September 22, 2012.
Sanger, D. E. (2012). Confront and Conceal: Obama’s Secret Wars
and Surprising Use of America Power. New York, NY: Crown Publishers.
Schell, B. H., et al. (2002). The Hacking of America: Who’s
Doing It, Why, and How. Westport, CT: Quorum Press.
Slater,
W. F. (2012). The Case for Integration of Cyberwarfare and
Cyberdeterrence Strategies into the U.S. CONOPS Plan to Maximize Responsible
Control and Effectiveness by the U.S. National Command Authorities. A
technical presentation published on November 18, 2012. Retrieved from http://www.billslater.com/writing/DET_630_Week_12_Writing_Assignment_Presentation_from_W_F_Slater_v1.pdf on
November 18, 2012.
Slater,
W. F. (2012). The Case for Integration of Cyberwarfare and
Cyberdeterrence Strategies into the U.S. CONOPS Plan to Maximize Responsible
Control and Effectiveness by the U.S. National Command Authorities. A
technical paper published on November 18, 2012. Retrieved from http://www.billslater.com/writing/DET_630_Week_12_Writing_Assignment_6_from_W_F_Slater.pdf on
November 18, 2012.
Stiennon, R. (2010). Surviving Cyber War. Lanham, MA: Government
Institutes.
Technolytics. (2011). Cyber Commander's eHandbook: The Weaponry
and Strategies of Digital Conflict. Purchased and downloaded from Amazon.com on
April 16, 2011.
Turzanski, E. and Husick, L. (2012). “Why Cyber Pearl Harbor
Won't Be Like Pearl Harbor At All...” A webinar presentation held by the
Foreign Policy Research Institute (FPRI) on October 24, 2012. Retrieved from http://www.fpri.org/multimedia/2012/20121024.webinar.cyberwar.html on
October 25, 2012.
Wikipedia Commons. (2011). Stuxnet Diagram. Retrieved
from the web at http://en.wikipedia.org/wiki/File:Step7_communicating_with_plc.svg on
December 20, 2011.
Zetter, K. (2011). How Digital Detectives Deciphered Stuxnet,
the Most Menacing Malware in History. An article published on July 11, 2011 at
Wired.com. Retrieved from the web at http://www.wired.com/threatlevel/2011/07/how-digital-detectives-deciphered-stuxnet/all/1 on
December 20, 2011.
Folks, please click on the link below and read up on this Batchwiper program and avoid it:
No comments:
Post a Comment