The World’s First Cyber Weapon Attack on a Nuclear Plant | Cyberwar

VICE News
28 Mar 202422:19

Summary

TLDRThe script delves into the discovery and implications of the Stuxnet virus, a sophisticated cyber weapon believed to be a joint operation by the US and Israel, aimed at sabotaging Iran's nuclear program. It explores the technical complexities of the virus, its impact on geopolitical tensions, and the broader consequences of cyber warfare on international relations and the global arms race in offensive cyber capabilities.

Takeaways

  • ⚠️ The discovery of a secret facility in Iran reignited global fears of nuclear threats, with many nations determined to prevent Iran from obtaining nuclear weapons.
  • 🖥️ A sophisticated computer virus, later identified as Stuxnet, was used to sabotage Iran's nuclear facility, marking the world's first known cyber weapon.
  • 🧠 Stuxnet employed advanced capabilities to hide its presence and was far more complex than typical viruses, taking cybersecurity experts months to analyze.
  • 🛠️ The virus exploited four zero-day vulnerabilities, a rare and highly valuable occurrence, allowing it to infiltrate the target systems undetected.
  • 🔌 Stuxnet targeted industrial control systems, specifically those using Siemens' Step 7 software, to disrupt the operation of programmable logic controllers (PLCs).
  • 🔍 The virus's design and deployment suggested it was a joint US-Israeli operation aimed at hindering Iran's nuclear program, although official confirmation is lacking.
  • 💣 Stuxnet physically destroyed centrifuges at Iran's Natanz facility by manipulating their operation, causing significant damage to the nuclear program.
  • 🔓 The virus bypassed the air-gapped security of the Natanz facility by being introduced through an infected USB stick, likely carried by an unwitting insider.
  • 🌍 The discovery and publicization of Stuxnet inadvertently ended the covert operation, but it had already achieved its goal of delaying Iran's nuclear capabilities.
  • 💥 The deployment of Stuxnet is viewed as the dawn of a new era in cyber warfare, spurring other nations to develop offensive cyber capabilities and marking the beginning of a cyber arms race.

Q & A

  • What fears were renewed by the secret facility in Iran?

    -The fears of a nuclear threat were renewed, as the world was concerned about the Iranian regime potentially gaining nuclear weapons.

  • What was unique about the computer virus that targeted the Iranian facility?

    -The computer virus, known as Stuxnet, was unique because it had never been seen before and had advanced capabilities to cover itself, making it a sophisticated and complex threat.

  • What is a 'zero-day' in the context of cybersecurity?

    -A 'zero-day' refers to a vulnerability or a security flaw in a computer system for which there is no fix available. It allows someone to execute code on a machine without the user's knowledge.

  • Why was the Stuxnet virus considered an act of war?

    -Stuxnet was considered an act of war because it was a covert operation that resulted in physical damage to Iran's nuclear facilities, without an official declaration of war.

  • What was the significance of the discovery of Natanz by the IAEA?

    -The discovery of Natanz was significant because Iran had not declared the facility, which was in violation of its obligations under the Non-Proliferation Treaty, and the facility's characteristics suggested it was intended for nuclear weapons production.

  • How did Stuxnet sabotage the centrifuges at the Natanz facility?

    -Stuxnet sabotaged the centrifuges by recording 30 days of normal operation and then manipulating the centrifuges to spin at abnormal speeds, causing them to shatter and destroy the facility.

  • How did Stuxnet manage to infect computers that were not connected to the internet?

    -Stuxnet infected the computers by 'jumping the air gap' through a USB stick that was placed into the computer by someone, likely an unwitting engineer.

  • What was the political impact of Stuxnet on Iran's nuclear program?

    -The political impact of Stuxnet included Iran admitting to a virus causing the shutdown of Natanz, and it potentially played a role in convincing Israel not to attack Iran, giving diplomacy a chance.

  • How did the discovery of Stuxnet influence the field of cybersecurity?

    -The discovery of Stuxnet highlighted the potential of cyber warfare and led to an arms race in cyberspace, with countries around the world racing to develop their own offensive cyber capabilities.

  • What was the 'Olympic Games' operation mentioned in the script?

    -The 'Olympic Games' was a covert operation, as revealed by the New York Times, in which the US, with help from Israel, created Stuxnet to sabotage Iran's nuclear program.

  • What are the broader implications of Stuxnet for the future of warfare?

    -The implications of Stuxnet for the future of warfare include the recognition of cyberspace as a digital battlefield, with the potential for cyber weapons to have devastating physical impacts, similar to traditional military weapons.

Outlines

00:00

🔒 The Emergence of Cyber Warfare: Stuxnet's Discovery

The first paragraph introduces the Stuxnet virus, a highly sophisticated cyber weapon that targeted a secret Iranian nuclear facility. It discusses the global concern over Iran's nuclear ambitions and the international response, including sanctions and threats of military action. The discovery of Stuxnet in 2010 is highlighted as a significant event in the realm of cyber warfare. The narrative mentions the complexity of the virus, its ability to self-cover, and the mystery surrounding its origin. The paragraph also emphasizes the shift in geopolitical dynamics due to cyber threats and the role of reporters in tracking these digital battles.

05:00

🛠️ Dissecting Stuxnet: Unraveling the Cyber Weapon

This paragraph delves into the technical analysis of the Stuxnet virus by security researchers at Symantec. It details the time-consuming process of understanding the virus's capabilities, which was far more complex than typical threats. The discovery of 'zero-day' vulnerabilities within Stuxnet is emphasized, highlighting the rarity and value of such security flaws. The narrative also touches on the virus's targeting of industrial control systems, specifically those using Siemens' Step 7 software, revealing a potential threat to critical infrastructure. The response from the international security community and the realization of Stuxnet's unprecedented nature in cyber attacks are also covered.

10:02

🌐 Stuxnet's Impact: Sabotaging Iran's Nuclear Program

The third paragraph discusses the impact of Stuxnet on Iran's nuclear program, particularly its effects on the Natanz facility. It describes the virus's operation, which involved recording normal operations to mask the sabotage, leading to significant damage to centrifuges. The paragraph also explores the mystery of how Stuxnet infiltrated a facility not connected to the internet, suggesting a USB stick as the vector. The political implications of the virus's discovery, including the assassination of Iranian nuclear scientists and accusations against Israel and the US, are also covered. The narrative underscores the chilling effect of Stuxnet on the cybersecurity community and the potential for escalation in geopolitical conflicts.

15:02

🔍 Uncovering the Truth: The Attribution of Stuxnet

This paragraph focuses on the efforts to attribute the creation of Stuxnet. It includes insights from a former director of the Cyber branch of the Department of Homeland Security and a nuclear policy expert, who discuss the sophistication of the virus and its specific targeting of industrial control systems. The narrative also touches on the international response, including the New York Times report on the US's involvement in creating Stuxnet as part of 'Operation Olympic Games,' and the subsequent political fallout. The paragraph highlights the covert nature of cyber warfare and the difficulty in definitively attributing responsibility for such attacks.

20:02

🚀 Stuxnet's Legacy: A New Era in Cyber Arms Race

The final paragraph reflects on the broader implications of Stuxnet, considering its role in triggering a new kind of arms race in cyberspace. It discusses the potential for other nations to develop similar capabilities and the challenges in defining and responding to cyber warfare. The narrative also considers the impact of Stuxnet on Iran's approach to cybersecurity, leading to the formalization of its Cyber Army. The paragraph concludes by acknowledging the transformative effect of Stuxnet on warfare, marking the beginning of a new chapter in digital conflict.

Mindmap

Keywords

💡Nuclear Threat

Nuclear threat refers to the danger posed by the potential use of nuclear weapons, which are capable of causing massive destruction. In the video, the concern is about Iran's alleged development of nuclear weapons, which could destabilize global security and lead to a nuclear arms race.

💡Cyber Weapon

A cyber weapon is a type of malicious software or code designed to disrupt, damage, or gain unauthorized access to computer systems. The video discusses 'Stuxnet,' the world's first known cyber weapon, which was used to sabotage Iran's nuclear program by attacking its industrial control systems.

💡Zero Day

A zero day is a vulnerability in software that is unknown to the software vendor, and thus, there is no patch available to fix it. The video mentions that 'Stuxnet' contained four zero-day exploits, which allowed it to infiltrate systems without detection and carry out its payload.

💡Scada

SCADA stands for Supervisory Control and Data Acquisition, which is a system used to control and monitor industrial processes. The script highlights that 'Stuxnet' had 'SCADA' strings, indicating it was targeting systems that control critical infrastructure such as power plants and factories.

💡PLC (Programmable Logic Controller)

A PLC is a digital computer used for operating an automated process by switching inputs to control machines. The video explains that 'Stuxnet' was designed to target PLCs, which are crucial for the operation of industrial systems, including those in Iran's nuclear facilities.

💡Air Gap

An air gap is a security measure that isolates a computer or network from other networks to prevent unauthorized access. The video discusses how 'Stuxnet' overcame the air gap by infecting a USB stick, which was then physically inserted into a computer within the target facility.

💡Olympic Games

Olympic Games was the code name for a covert operation involving the development of 'Stuxnet' by the United States and Israel. The video mentions this operation as an example of state-sponsored cyber warfare aimed at disrupting Iran's nuclear capabilities.

💡Centrifuges

Centrifuges are machines used in the enrichment of uranium, a critical step in the development of nuclear weapons. The script describes how 'Stuxnet' specifically targeted centrifuges in Iran's nuclear facilities, causing them to malfunction and thus disrupting the enrichment process.

💡International Atomic Energy Agency (IAEA)

The IAEA is an international organization that seeks to promote the peaceful use of nuclear energy and prevent the spread of nuclear weapons. The video references the IAEA's role in monitoring Iran's nuclear activities and the implications of the discovery of the Natanz facility.

💡Cyber Warfare

Cyber warfare involves the use of cyber attacks to disrupt, damage, or gain unauthorized access to another nation's critical infrastructure. The video posits that 'Stuxnet' marked the beginning of a new era in cyber warfare, with nations recognizing the potential of cyber weapons in conflicts.

💡Arms Race

An arms race is a competition between nations to develop and accumulate more and better weapons. The script suggests that the deployment of 'Stuxnet' triggered a new kind of arms race, with countries investing in offensive cyber capabilities to maintain strategic advantages.

Highlights

A secret facility in Iran raises fears of a nuclear threat, prompting global concern over the Iranian regime's potential to gain nuclear weapons.

A previously unseen computer virus with advanced capabilities is suspected to sabotage the Iranian facility, marking the world's first known cyber weapon.

The virus, Stuxnet, is revealed to be a complex piece of malware with the ability to cover its tracks, unlike anything seen before.

Stuxnet's discovery leads to the understanding that it was an act of war in the digital realm, without a formal declaration of war.

Hackers and nation-states are increasingly using cyber warfare to reshape geopolitical landscapes, with significant implications for national security.

In the early 2000s, the US feared Iran was secretly developing nuclear weapons, leading to UN sanctions and threats of war.

Stuxnet's appearance in June 2010 coincided with heightened tensions over Iran's nuclear program, particularly concerning the Natanz facility.

Security researchers at Symantec took months to analyze Stuxnet, uncovering its unprecedented complexity and sophistication.

Stuxnet exploited four zero-day vulnerabilities, a rare and valuable characteristic in malware, indicating a high level of sophistication.

The virus targeted industrial control systems, specifically programmable logic controllers (PLCs), which are critical for national infrastructure.

Homeland Security's analysis of Stuxnet confirmed its unique targeting of control systems, unlike typical malware.

Stuxnet's operation was simple yet deceptive; it recorded normal operation and then sabotaged the system while playing back the pre-recorded data.

The virus physically destroyed its targets, a first in cyber warfare, causing significant damage to Iran's nuclear facilities.

Despite the sophistication of Stuxnet, its discovery and analysis by security researchers inadvertently ended the covert operation.

The US and Israel's deployment of Stuxnet triggered a new arms race in cyber warfare, with nations racing to develop offensive cyber capabilities.

Stuxnet's impact on Iran's nuclear program was significant but temporary, possibly delaying it by 6 months to 2 years.

The political fallout from Stuxnet in Iran led to increased investment in cyber defense and offense, formalizing Iran's Cyber Army.

Stuxnet's discovery marked the dawn of a new chapter in warfare, with cyberspace becoming a new battlefield for nations.

Transcripts

play00:01

a secret facility in Iran renews fears

play00:02

of a nuclear threat the nations of the

play00:05

world must not permit the Iranian regime

play00:08

to gain nuclear weapons a computer virus

play00:10

that has never been seen before this

play00:12

isn't two kids in the basement in Kansas

play00:13

throwing some code together the virus

play00:16

sabotages that secret facility it used

play00:18

very Advanced capabilities to cover

play00:20

itself or obfuscate itself who built it

play00:23

in why is a mystery this was an act of

play00:26

War it was an act of War without there

play00:28

being a war stuck is the world's first

play00:30

known cyber

play00:43

[Music]

play00:52

weapon there are conflicts being waged

play00:54

all around us ones we can't see hackers

play00:57

are poised to dominate the 21st century

play01:00

reshaping geopolitical

play01:02

Landscapes sometimes on behalf of

play01:04

terrorists but often for governments or

play01:06

just because they think it's

play01:08

right as a reporter I've been covering

play01:11

National Security for vice and

play01:12

increasingly my job is to track these

play01:14

digital battles there's one computer

play01:17

virus that really showed how far

play01:18

everything had come in the early 2000s

play01:21

the US began to fear that Iran it's

play01:23

sworn enemy since 1979 was secretly

play01:26

developing its own nuclear weapons the

play01:28

UN responded with San s the US and

play01:30

Israel threatened war and then a

play01:33

mysterious computer virus dub stuck net

play01:36

appeared in June

play01:40

2010 we're head to sanch yes the same

play01:43

company that's protecting your desktop

play01:45

from malware to talk to an engineer and

play01:48

expert who forensically took apart stuck

play01:50

net and figured out that it wasn't just

play01:52

some run-of-the-mill trojan

play01:57

virus I got in touch with sanch security

play01:59

researcher Eric Chen he did some of the

play02:02

most in-depth analysis of the virus when

play02:03

it first appeared the average threat

play02:05

that we look at can take us 5 to 20

play02:07

minutes to look at and we know exactly

play02:10

what it does and stet took us months

play02:14

more than three months to look at so it

play02:15

just can give you a sense of how

play02:19

difficult how large and how complicated

play02:21

uh the threat was so why don't you tell

play02:23

me how you discovered stuck net so

play02:25

basically what happened was another

play02:27

security company that was based in b Bru

play02:30

uh found this binary and it had

play02:32

something in it that was called a zero

play02:33

day why don't you tell me what a zero

play02:35

day is a zero day basically is when you

play02:38

have what's called a vulnerability or

play02:39

you have a hole sort of in your computer

play02:41

a bug of some sort that allows someone

play02:43

to execute code on your machine without

play02:45

you knowing it your computer just has to

play02:47

be on and maybe even connected to the

play02:49

internet and that's it you don't have to

play02:51

be logged in you don't have to be

play02:52

browsing the web you don't have to

play02:53

double click on any files and so that

play02:54

means you have no way to protect

play02:55

yourself what about it had you never

play02:57

seen before an average threat doesn't

play02:59

have any sort of exploit inside of it

play03:01

this thing had four zero days inside of

play03:03

it what sets a zero day apart is that

play03:05

it's a security flaw that there's no fix

play03:07

for Zer days are incredibly rare and for

play03:09

that reason incredibly valuable what was

play03:12

the specifics of it that set off an

play03:15

alarm there's these skada strings inside

play03:17

skada basically is technology that's

play03:19

controlling uh robots and and automation

play03:22

or power plants and and things like that

play03:25

and we had never seen a threat that

play03:26

mentioned anything to do with scada this

play03:28

thing could actually be attacked some

play03:30

sort of national critical infrastructure

play03:32

this isn't like two kids in the basement

play03:33

in Kansas throwing some code together

play03:35

this thing had a full-on framework

play03:36

clearly had quality assurance behind it

play03:39

here we're talking about something that

play03:40

is just orders of magnitude greater than

play03:42

we've ever seen

play03:44

before as their investigation deepened

play03:46

Eric and his team realized stuck net was

play03:48

designed to Target computers using

play03:50

Seaman's proprietary software called

play03:52

Step seven what first caught our eye

play03:56

were all these strings like S7 and we

play03:59

began to sort of Google those sorts of

play04:01

strings we saw wicc and we saw step 7

play04:04

and when we looked those up we

play04:05

determined that this was actually

play04:07

software that would control

play04:09

plc's plcs are programmable logic

play04:11

controllers computer systems used for

play04:14

converting digital code into physical

play04:16

commands that automate everything from

play04:18

Factory Machinery to heating and cooling

play04:22

systems Eric now found himself in

play04:24

unknown territory so we reached out to

play04:26

the International Security Community we

play04:28

were sending out blogs

play04:30

all throughout that summer telling

play04:32

people if you're a PLC expert if you're

play04:34

an expert in critical National

play04:35

infrastructure contact us because we

play04:37

didn't even know what a PLC was at that

play04:39

time Eric and his team learned that plcs

play04:41

are extremely vulnerable to cyber

play04:43

attacks but he still didn't know which

play04:45

machines were the targets this

play04:47

sophisticated malware or malicious code

play04:50

was detected on Industrial Control

play04:52

Systems around the

play04:53

world cyber security analysts were

play04:57

puzzled at the same time Homeland

play05:00

Security was also trying to understand

play05:01

the virus Sean mcer was the director of

play05:04

enck the Cyber branch of the Department

play05:06

of Homeland Security when Stu net was

play05:08

identified what did your team see when

play05:10

they took it apart well the first thing

play05:13

we saw was that it was very

play05:14

sophisticated and its Communications

play05:16

capability so if you think of stuck net

play05:18

like a kinetic device like a a missile

play05:21

you had um the delivery vehicle you know

play05:24

that that which put the payload on

play05:26

target if you will and then the payload

play05:28

itself and they were very unique

play05:29

characteristics to both um Stu Net's

play05:32

ability to do digital reconnaissance

play05:34

without control it was essentially a a

play05:37

digital you know fire and forget type of

play05:40

approach the fact that it used you know

play05:42

four zero day

play05:43

vulnerabilities to gain access to the

play05:46

network is something that you had not

play05:47

seen in code before uh someone willing

play05:50

to risk that many zero days in order to

play05:53

get an on place and then when we saw the

play05:55

payload part which was actually

play05:57

specifically targeting an industrial

play05:59

control environment that's really for us

play06:02

became a a very significant event

play06:05

because Normal malware doesn't go after

play06:07

control systems and this was

play06:09

specifically focused on Control

play06:11

Systems it was non-stop for weeks um

play06:14

this was all we thought about all we

play06:16

worked on and you can imagine it was a

play06:19

really big shift from what we had done

play06:21

before the average threat we would

play06:22

finish in 5 to 20 minutes and here we

play06:24

were sitting on the same threat day

play06:26

after day hour after hour night after

play06:28

night and you know we weren't getting

play06:30

bored every single day every single week

play06:34

we were discovering new little Clues new

play06:36

little breadcrumbs that kept us going

play06:38

and kept us digging and kept us looking

play06:40

um until basically November when we

play06:42

finally figured out that this thing was

play06:44

indeed sabotage uh on the

play06:46

towns in what was basically an accident

play06:49

Eric and his team found themselves

play06:50

embroiled in a real life International

play06:52

Spy

play06:53

Thriller complex militia code had been

play06:56

written specifically to take out Iran's

play06:58

nuclear facilities

play07:00

while its authors remained in the

play07:04

shadows in 2002 the world discovered

play07:07

that aan had been building a secret

play07:08

uranium enrichment facility near the

play07:10

town of

play07:12

nutans the stuck computer virus has a

play07:15

direct link to this controversial plant

play07:17

the fact that Iran never declared the

play07:19

plant made it suspicious that was a

play07:22

breach of Iran's obligations James Acton

play07:24

knows nuclear policy inside out he also

play07:27

keeps tabs in the work of the ie a or

play07:30

the international atomic energy agency

play07:32

the world's nuclear Watchdog can you

play07:34

tell me what the climate was around the

play07:37

discovery of nans you know Iran's a

play07:39

member of the non-proliferation treaty

play07:41

and one of the requirements of that is

play07:43

that uh you're allowed to do pretty much

play07:45

anything you like in the nuclear field

play07:47

short of building a bomb but you have to

play07:49

declare it uh and not declaring nuclear

play07:53

facilities is a violation of your

play07:55

agreement with the Ia it found

play07:57

activities that look very much like what

play07:59

you wanted do if you'd build a nuclear

play08:00

weapon and why were they so interested

play08:02

in in the N like why was it the straw

play08:04

that broke the camels back nans was a

play08:06

controversial plant because um you know

play08:09

firstly any enrichment is inherently

play08:11

sensitive it's inherently dual use you

play08:13

can use it for fuel production or you

play08:16

can use it for nuclear weapons

play08:18

production the size of the plant was

play08:20

suspicious the plant's actually too

play08:22

small for a civilian plant uh military

play08:24

plants don't need to be as large as

play08:26

civilian plant so it was scaled as

play08:28

though it was right for uh making uh

play08:31

enriched uranium for weapons but wasn't

play08:33

the right size for uh enriched uranium

play08:36

for nuclear reactors the the discovery

play08:39

of um um the Iranian program did cause a

play08:43

lot of concern I mean there were a lot

play08:44

of countries who would genuinely and are

play08:47

genuinely very fearful that Iran would

play08:49

get the bomb and fearful of the

play08:50

consequences of it doing so Iran

play08:53

aggressively pursues these weapons and

play08:55

exports Terror States like these and

play08:58

their terrorist allies

play09:00

constitute an AIS of evil arming to

play09:02

threaten the Peace of the world Iran

play09:05

denied that nans was being used to

play09:07

produce nuclear weapons still its

play09:09

government bowed to pressure in 2003 and

play09:11

temporarily suspended uranium enrichment

play09:13

and processing activities at nans then

play09:16

in 2005 newly elected president Mahmud

play09:19

amadin Jad defiantly restarted the

play09:22

program within months the facility at

play09:24

nans was up and running and enriching

play09:26

uranium all over again concerned the UN

play09:29

osed sanctions by 2009 Israeli Prime

play09:32

Minister Benjamin Netanyahu challenged

play09:34

the us to stop Iran's nuclear

play09:37

program the most urgent challenge facing

play09:41

this body today is to prevents the

play09:43

tyrants of Teran from acquiring nuclear

play09:47

weapons Netanyahu was privately

play09:49

considering air strikes on

play09:52

nans it's during this high stakes

play09:54

political standoff that stuck net is

play09:56

detected in June 2010 in in fact stuck

play10:00

net was found in countries around the

play10:01

world but infection rates in Iran were

play10:04

off the

play10:04

charts and at the plant in N tons

play10:07

centrifuges were breaking down at

play10:09

unprecedented rates Stu Net's design is

play10:12

complex but its operation is deceptively

play10:15

simple like a security camera the virus

play10:17

records 30 days of normal center fuge

play10:20

operation while it hides in the system

play10:23

then when stuent attacks the centrifuges

play10:25

it plays back the pre-recorded data so

play10:28

operators on the outside can't see the

play10:29

infection raging within the

play10:32

[Music]

play10:33

centrifuges and those 30 days were not a

play10:36

coincidence that's how long it takes

play10:37

basically for a Cascade of centrifuges

play10:39

they basically get fully loaded with

play10:40

uranium gas so they wanted to basically

play10:42

have their sabotage effects happen right

play10:45

at the peak moment and caus the most

play10:46

damage so the centrifuges in it hands

play10:49

normally will spin at 1,000 Hertz and

play10:51

what the threat did was spin up the

play10:53

centrifuges to either 1400 Herz to be

play10:56

really fast or slow them down to two

play10:58

Herz to be really slow and what would

play11:01

happen is when they spin up really

play11:03

really fast centrifuge would basically

play11:04

vibrate uncontrollably and just shatter

play11:07

and you would have literally shards of

play11:08

aluminum flying across the room maybe a

play11:10

domino effect of centrifuges falling and

play11:12

toppling on each other and uranium gas

play11:14

leaking

play11:15

everywhere eventually they would hit the

play11:17

big red button to cause shutdown stet

play11:19

was smart enough to also hijack that

play11:22

that big red button went through a

play11:23

computer as well and they hijacked that

play11:25

code and basically would ignore it and

play11:27

allow their payload to take effect once

play11:29

it was inside it was Unstoppable they

play11:31

were doomed yeah The Operators were

play11:32

doomed the plant was

play11:34

doomed stuck net was the first digital

play11:36

weapon known to have physically

play11:38

destroyed its

play11:40

targets but the computer systems at nans

play11:42

weren't connected to the internet so how

play11:45

did stuck net get inside the

play11:48

system by 2010 it became evident that

play11:51

someone had decided that measures more

play11:52

drastic than sanctions and less

play11:55

spectacular than air strikes were needed

play11:57

to slow down Iran's nuclear program

play11:59

because out of nowhere a mysterious

play12:01

superv virus named stuck net was

play12:03

sabotaging an Irani nuclear facility but

play12:06

the computers in the facility weren't

play12:07

online so the question remained how the

play12:09

virus got inside the

play12:11

system I went to find darknet J an

play12:14

operational security expert to

play12:16

understand how stuck net could have

play12:17

infected them so how did stuck net jump

play12:21

the air gap and infect niton it jumped

play12:24

the air gap by traveling on a USB stick

play12:27

that was placed into the computer from

play12:30

someone darket J replicated the USB

play12:33

exploit to show me how stuck net

play12:35

infected the computers and N tons all

play12:37

right so what happens is you put in the

play12:41

USB you open up the folder Windows looks

play12:44

for an icon which is a malicious payload

play12:46

that can write to system I have it

play12:48

opening calculator so once the intended

play12:51

target opens the folder with Stu net

play12:54

inside of it what happens next

play12:56

essentially you can have complete

play12:57

control your computer meaning that can

play12:59

write anything to the hard disk it can

play13:01

grab credentials from the internet if

play13:03

you put them in at the time uh it can

play13:05

also propagate itself inside of your

play13:06

local area network wow it's Keys of the

play13:10

Kingdom that meant someone physically

play13:12

walked stuck net into the Iranian

play13:14

facility likely an unwitting engineer

play13:16

with an infected

play13:18

USB inside the virus wreaked havoc

play13:21

Center fuses were destroyed and the

play13:23

Iranians were clueless but then Eric

play13:25

Chen and his team at sanch announced the

play13:28

details of stuck net to the the world in

play13:29

a blog

play13:31

post then naton shut down most assumed

play13:34

Iranian authorities finally understood

play13:36

the mess they were in and we're trying

play13:37

to clean it up after that two Ronan

play13:40

nuclear scientists were targeted by

play13:42

motorcycle riding assailants who slipped

play13:44

a sticky bomb onto one of their cars one

play13:47

was killed the other seriously injured

play13:49

it appeared whoever was behind stuck net

play13:51

went to plan B soon after the Iranian

play13:54

president admitted a virus caused the

play13:56

shutdown in

play13:58

nans

play14:02

he blamed Israel but couldn't back it up

play14:03

with any hard evidence the assassination

play14:06

sent a chill through the cyber security

play14:07

community did it make you a little bit

play14:09

nervous we would look in our River

play14:10

mirrors all the time and you know I

play14:12

would see a motorcycle and watch them

play14:13

closely it definitely wasn't lost on us

play14:16

that we were in the middle of some big

play14:18

geopolitical Affair Iran openly accused

play14:21

Israel in the US of being the

play14:22

masterminds of stuck

play14:28

net I want to talk to someone who was

play14:30

trying to stop the crisis from

play14:31

escalating

play14:33

further beautiful

play14:36

day Jamal Abdi is a foreign policy

play14:39

analyst for the national Iranian

play14:40

American Council and has advised

play14:42

Congressional members on relations with

play14:44

Iran people like myself who were trying

play14:46

to broker a diplomatic solution trying

play14:49

to figure out an off-ramp from these

play14:50

escalatory moves I really thought this

play14:52

is a extremely bad term what was the

play14:55

reception of stuck net in Iran how did

play14:57

people feel about it I I I think the

play14:59

Iranians very credibly belied that

play15:01

Israel was behind this and then there

play15:03

was also just the fact that there were

play15:05

all these other sabotage efforts that

play15:07

they believed Israel was connected to

play15:10

Israel was in many regards the driving

play15:14

force against Iran's nuclear program and

play15:17

then you have a Hardline government like

play15:18

Amad that's essentially inflaming the

play15:21

issue it was how do we slow that down as

play15:24

much as possible because we know we

play15:26

can't stop

play15:27

it but it wasn't until 2 years later

play15:30

that the New York Times published an

play15:31

explosive story revealing the US was

play15:34

behind stuck net unnamed officials told

play15:37

the paper the US created the virus with

play15:39

help from Israel it was part of a covert

play15:41

operation dubbed Olympic Games the

play15:44

allegation set off a political Firestorm

play15:47

so Federal probe was launched to

play15:48

investigate the leak but in 2015 the

play15:51

investigation was put on ice over us

play15:53

fears of what might come out in court

play15:55

for me it always comes down to the leak

play15:57

investigation you don't launch a leak

play15:58

investig for a covert operation you

play16:00

didn't do Kim zeter has been covering

play16:01

the stuck net story for Wired since the

play16:03

virus was first discovered the United

play16:06

States like they did stuck net I don't

play16:08

think that there's a question that the

play16:09

US is behind it I mean it's not even

play16:11

something that I think that we you know

play16:12

have to sort of debate Stu net was a

play16:14

Precision weapon so it would never

play16:16

destroy anything except what matched a

play16:18

very specific configuration and you can

play16:20

see lawyers uh fingerprints are all over

play16:23

Stu net I think that's the first time

play16:25

I've heard someone say that lawyers

play16:26

fingerprints were all over stet you can

play16:28

see

play16:29

that as they were designing this the

play16:30

lawyers would have had very tight uh

play16:32

restrictions uh for controlling this

play16:34

they would have told the developers this

play16:36

can only affect the systems that are

play16:38

targeted you have to write this in such

play16:39

a way it likely blocks out two major

play16:42

nation states that could have done it

play16:44

China and Russia I'm not sure they would

play16:45

have cared too much about the legal

play16:46

implications exactly this was so this

play16:48

was one of the reasons that uh people

play16:49

were so certain it was the us all of the

play16:52

available Clues suggested that stuck net

play16:54

was a joint us Israeli operation but

play16:57

government officials have gone to Great

play16:58

length not to acknowledge it see the

play17:01

evidence is lacking I I think that there

play17:03

is no clear um complete evidence or uh

play17:08

even complete indication that uh it was

play17:12

one country or another to this day the

play17:14

US government will not confirm or deny

play17:16

its role in stuck

play17:18

net stuck Net's Architects might want to

play17:21

stay in the shadows but around the world

play17:23

other governments took notice of the

play17:24

Cyber weapon they'

play17:27

Unleashed

play17:29

when security researchers found stuck

play17:31

Ned and publicized the discovery of the

play17:33

destructive malware they inadvertently

play17:35

brought a covert operation to a

play17:36

premature

play17:38

End by the time we discovered stet it's

play17:41

believed that it already had delivered

play17:42

its payload at least once so I'm sure

play17:45

the attackers would prefer that it

play17:46

wasn't uncovered um because maybe they

play17:49

could have continued or or continued

play17:50

further operations but it at least

play17:52

accomplished its goal at least according

play17:54

to the Ia documents that showed that uh

play17:56

a few thousand centrifuges were were

play17:58

destroyed destroyed um just before

play18:01

2010 but what effect did it have on the

play18:04

nuclear standoff between Iran Israel and

play18:06

the West you know looking back on this

play18:08

there's no question that it slowed down

play18:10

the program was it a successful attack

play18:12

in that sense it kind of partially

play18:14

depends what you mean by success I think

play18:16

Stu net probably played a role in

play18:17

convincing Israel not to attack Iran and

play18:19

giving diplomacy more of a

play18:21

chance stuck net may have just slowed

play18:24

down Iran's nuclear weapons program by 6

play18:26

months to 2 years buying time for deploy

play18:28

Acy but it didn't exactly stop Iran from

play18:31

pursuing the bomb do you think it was

play18:33

effective it was you know one step

play18:36

forward two steps back it delayed Iran's

play18:38

program certainly I think by several

play18:40

months maybe a year but it also

play18:43

politically it convinced Iran that they

play18:46

were under siege it made an argument a

play18:48

case for why Iran needed to have

play18:51

capabilities to counter cyber warfare as

play18:53

well as capabilities to defend the

play18:55

country if Iran wants to develop nuclear

play18:57

weapons they can nuclear weapons this is

play19:00

not a technical decision it's a

play19:02

political decision and stuck net was a

play19:04

technical response that maybe on a

play19:06

technical level slowed the program down

play19:09

but on a political level actually helped

play19:11

to accelerate the program so I think in

play19:13

that regard if you're looking at

play19:14

actually preventing Iran from developing

play19:16

nuclear weapons or convincing them to

play19:17

not go down that route stuck net was a

play19:21

failure finally after years of crippling

play19:24

un sanctions Iran agreed to limit their

play19:26

nuclear program in

play19:27

2015 exchange for partial lifting of

play19:31

sanctions but by deploying stucks net

play19:33

the US and Israel had triggered a

play19:34

different kind of arms

play19:37

race this was an active war and it was

play19:40

an active War without without there

play19:42

being a war if you drop a bomb on

play19:44

someone they know that they've been

play19:45

attacked right but in digital Warfare

play19:47

you may never know that you're under

play19:49

attack the US opened a door um that

play19:51

everyone is going to walk through

play19:54

now in Iran was stuck that scene as an

play19:58

act war in Iran it was it was seen as an

play20:00

act of war and there was sort of a

play20:02

question that was opened up did the

play20:04

United States just declare war on Iran

play20:07

um it's such a gray area though so I

play20:09

think that even now people are still

play20:11

kind of trying to figure out whether

play20:12

this constitutes war or not but

play20:14

technically technically it was and I

play20:16

think inside of Iran it was really

play20:17

viewed that way and I think it really

play20:19

opened a lot of eyes inside the

play20:20

establishment of Iran that they needed

play20:22

to get Savvy in this field to be able to

play20:24

defend as well as attack and so you've

play20:26

got the you know the formation the Cyber

play20:29

Army inside of Iran that was initially

play20:31

really much really aimed at activists

play20:33

inside the country but then after suet

play20:35

it became even more formalized all kinds

play20:37

of money was poured into it because this

play20:39

was now not just an internal threat but

play20:40

an external threat it spurred Iran to be

play20:43

more offensive it spurred everyone to be

play20:45

more offensive that's the thing it's not

play20:47

Iran there are there are other people to

play20:49

be worried about than Iran all of that

play20:52

together has created this arms race of

play20:54

other countries would you agree that it

play20:57

was the dawn of a new chapter in cyber

play20:59

warfare the expected response is that a

play21:02

lot of other countries now are

play21:04

establishing offensive cyber operations

play21:06

they don't want to be left

play21:08

behind stuck net had launched the race

play21:10

to militarize

play21:12

cyberspace and the more the world is

play21:14

connected the more targets there are for

play21:17

attack countries around the world are

play21:19

racing to design new malware for the

play21:21

next generation of

play21:22

warfare do you think it's going to

play21:24

become another tool in the toolbox of

play21:27

War absolutely stuck net to me was the

play21:29

Trinity moment and by that I mean the

play21:31

first Trinity explosion you know

play21:33

demonstration of a of a nuclear

play21:34

detonation in New Mexico we demonstrated

play21:37

a capability that uh you could have

play21:40

devastating physical impacts by cyber

play21:43

means it was a bit like the bomb once

play21:45

the secret was out people started

play21:48

getting it for themselves we started

play21:49

recognizing that there's no putting this

play21:51

back you know the key was turned the lid

play21:53

was opened and everything in Pandora's

play21:55

Box was now out in the open and there

play21:57

was no way to get it back in

play22:02

stuck net was the world's first known

play22:03

cyber weapon it set the stage for a new

play22:06

kind of War one that will play out on a

play22:08

digital

play22:18

Battlefield

Rate This

5.0 / 5 (0 votes)

Etiquetas Relacionadas
StuxnetCyber WarfareNuclear ThreatIranInternational SecurityDigital SabotageVirus AnalysisGeopolitical LandscapeCyber Arms RaceNational Security
¿Necesitas un resumen en inglés?