Page 212 Part 4: Militarization Stuxnet, Flame, and Duqu - the DLYMPIC GAMES Chris Morton1 Stuxnet emerged on the wořld stage in the sununer of2010 as the most sophisticated piece of malicious software ever found. Designed to permanently damage Iranian uranium enriclunent gas centrifuges, Stuxnet represented a quantum leap in complexity and audaciry in cyber conflict. Not only did the malware astonish researchers with its ab~ty to penetrate and cripple a secretive regime's sensitive nuclear enrichment prog~, 1t. ~so \ concerned security experts due to its brash destruction of part of a nanon s cnttcal i infrastructure.With the emergence of the Duqu and Flame computer viruses,the revelation ofa covertAmerican cyber campaign (code-named OLYMPIC GAMES) against Iran, and the recognition of commonality between the three pieces of malware, Stuxnet became known as the centerpiece of a broader campaign, one that rnight hint at the future of warfare. 171e 11ppe11m11ce ojStux11et WllS like the 11rri1111/ oj1111 F-35 illfo 11 World War I battlefield. Ralph Langner,2010 The target of the Stuxnet Worm was Iran's uranium enrichment program at the Natanz nuclear facility, or more specifically, Iran's uranium gas centrifuge tubes. Gas centrifuge tubes are used to enrich uranium, so that it may be used as a fuel for nuclear reactors. If refined highly enough, the uranium be can used in nuclear weapons. Stuxneťs payload only targets systems that meet very detailed specifications, those that perfectly match the gas centrifuges Iran uses at Natanz. The malware operated for over a year at Natanz completely undetected, destroying gas centrifuge tubes, masking the damage it was causing, and sending data back to the pl~nt operatorsand digital failsafe systems that the tubes were working perfectly.While sabotagmg the enrichment process, Stuxnet was able to replicate itself throughout the system and evolve through updates pushed to it by servers located in two different countries.2 In November 2010, four months after the news of Stuxnet went public, the lranian goverrnnent acknowledged that a cyber attack damaged its uranium enrichment program at Natanz. In a press conference, Iranian President Mahmoud Alunadinejad said that,"They A 201 1 gr.iduatc from Gcorgctown's Public Policy Institute, C hris Morton has spent thc past twclvc ycars in public H< scrvacc. Hu cxpcncncc ranges from sanall group leadcrsbip 10 inffucncmg polacy ar the strarcgac l~elsC.o~goverru~~ th< holeb a Masrer< dcgrcc in Policy Mana!l"mcm and a Dachclor of&aencc degree in Chcrrusrry an La c .ctencn.. Uniicd Statcs Military Ac•dcmy al Wcs1 Point. Chris is originally from Muskogcc. O klahoma. _The assertton.s, opm•:·~, „. „,..„,Hnnt-;,..,..." "v"''"'>urg<·nts." 17 Wciss."lsracl and lran:Thc Bonds thatTic Pcrsiam andjcws." A Fierce Domain: Conflict in Cyberspace, 1986 to 2012 Page 217 to keep their nuclear ambitions under wraps.The best answer m.ight have rested in the dark recesses ofcyber sabotage. The Incident Stuxnet was designed to destroy Iran's IR-1 centrifuges, rendering them useless for enriching uranium by speeding them up and slowing them down quickly, causing permanent vibrational damage. Damaging these tubes would notjt1st delay che enrichment/ of uranium; it would also sew interna! doubt as to the competence of the Iranian scientists. To accomplish its goal, Stuxnec employed the most sophisticated cyber attack methods seen at the time. lt accacked sever.i! points of entry to the Natanz nuclear enrichment facility, employed a "dual-warhead" design to deliver its malicious software, and updated itself through peer-topeer updates to evolve in changing conditions. The Timeline S111x11er bc/1.1wd like" /<1b r<1r tllrs on."Stuxner Shut Down by its O wn Kill Switch." 34 Sangcr."Obama Ordcr Spcd Up." 35 Ibid. ... Page 220 Part 4: Militarization Flame, announced to the world by Kaspersky Lib in May 2012, also serves to gather intelligence, but on a much grander cale. Twenty times larger than Stuxnet and more diverse than Duqu, Flame steals documents, takes screen shots frolll computers, records audio, and even accesses remote Bluetooth devices connected to computers to send and receive information.-''J Recording keystrokes as Duqu did is one thing, but turning on and off microphones, computer cameras, and even extracting a geolocation from an image was off the charts at the time in tenns of sophiscication. Furthermore, Flame operated undiscovered for more than two years before it was found and revealed in the spring of 2012.4 " It too shared lines of code with Stuxnet, making them brothers, or at least first cousins. Duqu and Flame could gather intelligence and disable security settings, enabling Stuxnet to do its damage. The Anatomy ofthe Attack Stuxneťs attack was simply a quantum leap in terms of the sophistication of its design and effects. Until 201O, most malware focused on other computers-either by overloading networks with DDOS attacks, such as occurred in Estonia during 2007, orby stealing data, such as the operation revealed in 2010 against the Defense Department, which began at the United States Centra! Command.41 Stuxnet was diffcrent- it da111<1ged info1structure not dircctly connected to the Internet. ln an interview in 2011 , <111 official from the D epartment ofHomeland Security lauded Stuxneťs elegance. H e highlighted the malware's f complexity and its ability to perform multiple phases of an attack- infiltration, assumption ofcontrol,surveillance, and finally the extraction or dcstruction ofinformation,all without independent human control or conunands.42 / / ~ „ Upon analysis, researchers found thac Scuxnec targecs induscrial control sysccms, rewntmg the computer code o~ic c~troll~(PLCs),or more specifically,S.iemens Supervisory and Concrol and Data Acquisitions (SCADA) syscems. After changmg the LC software to direct industrial systems to operace in a manner chat Stuxnet desires, it hides these changes from the operators of the industnal systems.~·' Stuxnet employed an I unprecedented four Microsoft Windows vulnerabilitics to gain control of the PLCs chat dictatc che spced at which IR- l gas centrifuges spin. Once it gained authority over the tubes, Stuxnet sped thcm up and slowcd them down, causing irreversible vibration damage. Ir also opened and closed valves between groups ofcencrifuge tubes, called cascades, either to confuse operators or to cause further damage. Once the ccntrifuges are dalllaged, A Ficrce Domain: Contlict in Cyberspace, 1986 to 2012 Page 221 they become unusable and must be replaced in order for them to enrich uraniu 44 m. Sin~ultaneously, the malware overrode automated system health indicator monitoring, g1vmg operators indications of norma! functioning tubes.4; Stuxnet employed