This 2011 was the year of the consecration of cyber weapons from a mediatic point of view. Awareness of the threat has been shared by all the major states of the world. This weapons could be been used in cyber attacks, claiming victims from cyberspace to the real world. Names like Stuxnet and Duqu have become familiar, malware projects known to experts in the field and that are considered case studies for specialists. Who has designed these deadly weapons? Which are the investments behind their production and what the real goals? Certainly, at least in the case of Stuxnet, we have found that malware had the objective of the SCADA system deployed inIranian atomic plants. Exactly Iran, more than any other nation is doing to discuss cyber security experts. Country considered at the forefront in cyber space, but that is confronting with many internal economic and policies difficulties and that is scaring the larger of the planet. So here we are talking about “Iran Cyber Power” dangerous adversary to fear in the cyber space, where giants and dwarfs are indistinguishable, a place where there seems to be more equilibrium.
In this post I would like to bring to your attention the intervention of Nima Bagheri, Security Researcher & CEO of Security U0vd, at Malcon in 2011 titled “Hiding & Rootkits Stuxnet 3.0 features as possible.” Personally I find it interesting because it opens the door to the scenarios we have predicted, regarding the possible evolution of cyber weapons as Stuxnet. The appearance of Duqu has raised innumerable theories about the degree of kinship with Stuxnet.
They share code components and modules that have been isolated and examined by the reseacher. Stuxnet is designed to attack SCADA systems, Duqu with information gathering purpose. But do you remember their innovative feature? The scalability! Be expected that these projects are works in progress and they will be improved with components developed to attack strategic well identified targets. But then which are the features that we believe may be present in future versions of these dreaded malware. Ask ourself this question well in advance is crucial to guide the research for the malware prevention.
The researcher Nima Bagheri has tried to simulate the behavior of the malware that could be construed as Stuxnet 3.0.
First, those who are working on future malware will try to operate silently hiding from the main anti rootkit. To do this it is expected that the starting point is really a reverse engineerof the methods used by rootkit software front for the analysis of suspicious behavior.
“Attackers Could hide from anti-rootkit Any resorces manipulating the results of their scan”
Which are the main steps to follow?
Simple considerations based on complex jobs, I think this is the right spirit to face a changing and dangerous threat.
Thanks Nima Bagheri
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.