How Malware Analysis Help SOC Analysts:

US and Israel have created STUXNET (Malware) to disrupt Iran’s Nuclear plant. Propagation thru USB drive and had 4 Zero day vulnerabilities.

Steps involved in disruption:

  1. Infection –> thur USB stick
  2. Search –> Stuxnet will search whether the machine is part of targeted control systems made by Siemens.
  3. Update –> If the target system is having a Siemens control system, will search and update the recent version of itself.
  4. Compromise –> Via Zero day vulnerabilities.
  5. Control –> Spies the operations of Nuclear plants to control the centrifuges.
  6. Deceive and Destroy –> Once the required info is received, Stuxnet starts to provide false command to destroy the powerplant.
  • Stuxnet had 4 Zero day vulnerabilities
  • S…

Similar Posts

Loading similar posts...

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help