Risk
8/4/2011
08:57 AM
50%
50%

Stuxnet Changes Terrorism Equation, Says Former CIA Official

The attack marks a turning point for counterterrorism efforts, making cyber a potential threat to any nation's domestic security.

Black Hat
The ability of the Stuxnet cyberattack to physically impact equipment has made cybersecurity significantly more important for U.S. domestic security strategy, a former counterterrorism official told attendees during the opening keynote at the Black Hat Security Briefings in Las Vegas, a UBM TechWeb event.

Until now, the primary worry of the U.S. government's counterterrorism groups has been stated by CBRN, which listed threats in order of likelihood: chemical, bacteriological, radiological, and nuclear, said Cofer Black, vice president for global operations for threat analysis firm Blackbird Technologies, and a 30-year veteran of the CIA's counterterrorism efforts. Since Stuxnet, terrorism concerns have morphed into KBC: kinetic, bacteriological, and cyber, he said.

"The Stuxnet attack is the Rubicon of our future," Black told attendees, referring to the river near Rome that Julius Caesar crossed to start an insurrection and become emperor, and which has become synonymous with a point of no return. "Your world, which people thought was college pranks cubed and squared, has now morphed into physical destruction ... from the victim's view, of a national resource. This is huge."

The extensive research and development required to make Stuxnet a reality suggests a nation-state's efforts. And the ability to affect physical assets means that cyber must now be considered a tool that could be utilized by terrorists, Black said.

Stuxnet, considered the first known cyberweapon, caused centrifuges critical to uranium processing to malfunction in Iran's processing facility, setting back that nation's attempts to develop a nuclear program.

Black's statements came the same day security firm McAfee revealed that dozens of companies had been targeted by a massive spy network that attempted to steal intellectual property and sensitive government information. Dubbed Shady RAT, the network appears to be the work of a nation-state, although McAfee would not name a particular country.

Read the rest of this article on Dark Reading.

Security concerns give many companies pause as they consider migrating portions of their IT operations to cloud-based services. But you can stay safe in the cloud. In this Dark Reading Tech Center report, we explain the risks and guide you in setting appropriate cloud security policies, processes and controls. Read our report now. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7444
Published: 2015-09-01
The Special:Contributions page in MediaWiki before 1.22.0 allows remote attackers to determine if an IP is autoblocked via the "Change block" text.

CVE-2015-2807
Published: 2015-09-01
Cross-site scripting (XSS) vulnerability in js/window.php in the Navis DocumentCloud plugin before 0.1.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the wpbase parameter.

CVE-2015-6520
Published: 2015-09-01
IPPUSBXD before 1.22 listens on all interfaces, which allows remote attackers to obtain access to USB connected printers via a direct request.

CVE-2015-6727
Published: 2015-09-01
The Special:DeletedContributions page in MediaWiki before 1.23.10, 1.24.x before 1.24.3, and 1.25.x before 1.25.2 allows remote attackers to determine if an IP is autoblocked via the "Change block" text.

CVE-2015-6728
Published: 2015-09-01
The ApiBase::getWatchlistUser function in MediaWiki before 1.23.10, 1.24.x before 1.24.3, and 1.25.x before 1.25.2 does not perform token comparison in constant time, which allows remote attackers to guess the watchlist token and bypass CSRF protection via a timing attack.

Dark Reading Radio
Archived Dark Reading Radio
Another Black Hat is in the books and Dark Reading was there. Join the editors as they share their top stories, biggest lessons, and best conversations from the premier security conference.