Stuxnet Changes Terrorism Equation, Says Former CIA Official
The attack marks a turning point for counterterrorism efforts, making cyber a potential threat to any nation's domestic security.
The ability of the Stuxnet cyberattack to physically impact equipment has made cybersecurity significantly more important for U.S. domestic security strategy, a former counterterrorism official told attendees during the opening keynote at the Black Hat Security Briefings in Las Vegas, a UBM TechWeb event.
Until now, the primary worry of the U.S. government's counterterrorism groups has been stated by CBRN, which listed threats in order of likelihood: chemical, bacteriological, radiological, and nuclear, said Cofer Black, vice president for global operations for threat analysis firm Blackbird Technologies, and a 30-year veteran of the CIA's counterterrorism efforts. Since Stuxnet, terrorism concerns have morphed into KBC: kinetic, bacteriological, and cyber, he said.
"The Stuxnet attack is the Rubicon of our future," Black told attendees, referring to the river near Rome that Julius Caesar crossed to start an insurrection and become emperor, and which has become synonymous with a point of no return. "Your world, which people thought was college pranks cubed and squared, has now morphed into physical destruction ... from the victim's view, of a national resource. This is huge."
The extensive research and development required to make Stuxnet a reality suggests a nation-state's efforts. And the ability to affect physical assets means that cyber must now be considered a tool that could be utilized by terrorists, Black said.
Stuxnet, considered the first known cyberweapon, caused centrifuges critical to uranium processing to malfunction in Iran's processing facility, setting back that nation's attempts to develop a nuclear program.
Black's statements came the same day security firm McAfee revealed that dozens of companies had been targeted by a massive spy network that attempted to steal intellectual property and sensitive government information. Dubbed Shady RAT, the network appears to be the work of a nation-state, although McAfee would not name a particular country.
Security concerns give many companies pause as they consider migrating portions of their IT operations to cloud-based services. But you can stay safe in the cloud. In this Dark Reading Tech Center report, we explain the risks and guide you in setting appropriate cloud security policies, processes and controls. Read our report now. (Free registration required.)
Published: 2014-12-17 Multiple cross-site request forgery (CSRF) vulnerabilities in ARRIS Touchstone TG862G/CT Telephony Gateway with firmware 7.6.59S.CT and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) enable remote management via a request to remote_management.php,...
Published: 2014-12-17 Cross-site scripting (XSS) vulnerability in ARRIS Touchstone TG862G/CT Telephony Gateway with firmware 7.6.59S.CT and earlier allows remote authenticated users to inject arbitrary web script or HTML via the computer_name parameter to connected_devices_computers_edit.php.
Published: 2014-12-17 The management console on the Symantec Web Gateway (SWG) appliance before 5.2.2 allows remote authenticated users to execute arbitrary OS commands by injecting command strings into unspecified PHP scripts.