The Next Cyber Weapon: Hypothesis on Stuxnet Three

Wednesday, December 28, 2011

Pierluigi Paganini

03b2ceb73723f8b53cd533e4fba898ee

What Should We Expect from Next Cyber Weapon? Hypothesis on Stuxnet Three

2011 was the year of the consecration of cyber weapons from a mediatic point of view. Awareness of the threat has been shared by all the major states of the world.

These weapons could be been used in cyber attacks, claiming victims from cyberspace to the real world. Names like Stuxnet and Duqu have become familiar, malware projects known to experts in the field and that are considered case studies for specialists.

Who has designed these deadly weapons? Which are the investments behind their production and what the real goals? Certainly, at least in the case of Stuxnet, we have found that malware had the objective of the SCADA system deployed inIranian atomic plants.

Iran, more than any other nation is considered at the forefront in cyber space, but that is confronting with many internal economic and policy difficulties and that is scaring the rest of the planet. So here we are talking about “Iranian Cyber ​​Power”- a dangerous adversary to fear in the cyber space, where giants and dwarfs are indistinguishable, a place where there seems to be more equilibrium.

In this post I would like to bring to your attention the intervention of Nima Bagheri, Security Researcher & CEO of Security U0vd, at Malcon in 2011 titled “Hiding & Rootkits Stuxnet 3.0 features as possible.

Symantec Percent of Hits from W32.Stuxnet by Country What should we expect from next cyber weapon? Hypothesis on Stuxnet 3

Personally I find it interesting because it opens the door to the scenarios we have predicted regarding the possible evolution of cyber weapons as Stuxnet. The appearance of Duqu has raised innumerable theories about the degree of kinship with Stuxnet.

They share code components and modules that have been isolated and examined by the researcher. Stuxnet is designed to attack SCADA systems, Duqu with information gathering purpose. But do you remember their innovative feature? The scalability!

Be expected that these projects are works in progress and they will be improved with components developed to attack strategic well identified targets. But then which are the features that we believe may be present in future versions of these dreaded malware. Asking yourself this question well in advance is crucial to guide the research for the malware prevention.

The researcher Nima Bagheri has tried to simulate the behavior of the malware that could be construed as Stuxnet 3.0. First, those who are working on future malware will try to operate silently hiding from the main anti rootkit. 

To do this it is expected that the starting point is really a reverse engineer of the methods used by rootkit software front for the analysis of suspicious behavior. “Attackers Could hide from anti-rootkit, manipulating the results of their scan”:

Which are the main steps to follow?

  • Find the anti rootkit process ID?
  • Access to the process opening it.
  • Reserve a region of memory within the address space of a target process.
  • Write data to a memory area of a specific process.
  • Remove anti rootkit alert generated during this operations. Who is developing the malware has the exclusive opportunity to test the anti rootkit monitor behaviour. He can hide malware process ID, its path and process name.

Simple steps to repeat for any anti rootkit software to test, recording their answers to the threats and implementing the necessary masking actions, very easy for anyone familiar with software development and in particular the procedures for the management of thread.

Next step is therefore to elude anti virus systems and this is really simple to do if the author of the malware uses kernel drivers inside their components, Stuxnet and other modern malware do it. To avoid this operation the only chance that we have is to block any open process in kernel drivers, really difficult to do if the attacker has enough access to the system.

In light of these considerations that are very important for those interested in the processes of malware creation and testing, what are the characteristics that we will identity in future instances of direct descendants of the current agents Duqu  and Stuxnet?

  • Deep information manipulation
  • Transferring information via Command & Control mainly through via search engine optimization and SEO search engines like Bing, Google or Yahoo.
  • Free file format exploit with special attention to those file formats that are free and not owned by organizations like AVI format.

Simple considerations based on complex jobs, I think this is the right spirit to face a changing and dangerous threat. Thanks Nima Bagheri...

References

http://www.youtube.com/watch?v=_UfrNMF-E5M

Cross-posted from Security Affairs

Possibly Related Articles:
14371
Viruses & Malware
Information Security
SCADA malware Rootkits Iran Cyberwar Stuxnet Network Security DUQU
Post Rating I Like this!
The views expressed in this post are the opinions of the Infosec Island member that posted this content. Infosec Island is not responsible for the content or messaging of this post.

Unauthorized reproduction of this article (in part or in whole) is prohibited without the express written permission of Infosec Island and the Infosec Island member that posted this content--this includes using our RSS feed for any purpose other than personal use.