- Cybersecurity:Attack and Defense Strategies
- Yuri Diogenes Erdal Ozkaya
- 366字
- 2021-06-30 19:15:57
Assault
Assault is the most feared stage of any cyber-attack. It is where the attacker does damage exceeding the data and software. An attacker might disable or alter the functioning of the victim's hardware permanently. The attacker focuses on destroying hardware controlled by the compromised systems and computing devices.
A good example of an attack that got to this phase is the Stuxnet attack on Iran's nuclear station. It was the first recorded digital weapon to be used to wreak havoc on physical resources. Just like any other attack, Stuxnet had followed the previously explained phases and had been residing in the facility's network for a year. Initially, Stuxnet is used to manipulate valves in the nuclear facility, causing the pressure to build up and damage a few devices in the plant. The malware was then modified to attack a larger target, the centrifuges. This was achieved in three stages.
The malware was transmitted to the target computers through USB thumb drives, since they were not connected to the internet. Once it infected one of the target computers, the malware replicated itself and spread to the other computers. The malware proceeded to the next stage where it infected some software by Siemens called Step7 that was used to control the programming of logic controllers. Once this software was compromised, the malware finally gained access to the program logic controllers. This allowed the attackers to directly operate various machinery in the nuclear plant. The attackers caused the fast-spinning centrifuges to spin out of control and tear apart on their own.
The Stuxnet malware shows the heights that this phase can reach. The Iranian nuclear facility stood no chance of protecting itself as the attackers had already gained access, escalated their privileges, and stayed out of sight from security tools. The plant operators said that they were receiving many identical errors on the computers, but all virus scans showed that they had not been infected. It is clear that the attackers did a few test runs of the worm within the compromised facility with the valves. They found out that it was effective, and decided to scale up to attack the centrifuges and crash Iran's nuclear weaponry prospects.
- Linux設(shè)備驅(qū)動開發(fā)詳解:基于最新的Linux4.0內(nèi)核
- Designing Purpose:Built Drones for Ardupilot Pixhawk 2.1
- Ansible權(quán)威指南
- Kubernetes網(wǎng)絡(luò)權(quán)威指南:基礎(chǔ)、原理與實踐
- Windows Server 2012 Hyper-V Cookbook
- 開源安全運維平臺OSSIM疑難解析:入門篇
- Windows Phone應(yīng)用程序開發(fā)
- 網(wǎng)絡(luò)操作系統(tǒng)教程:Windows Server 2016管理與配置
- AutoCAD 2014中文版從入門到精通
- Hands-On UX Design for Developers
- 計算機(jī)系統(tǒng)的自主設(shè)計
- Linux設(shè)備驅(qū)動開發(fā)
- Vim 8文本處理實戰(zhàn)
- Windows 8實戰(zhàn)從入門到精通(超值版)
- CentOS 6 Linux Server Cookbook