Wednesday 15 July marks 10 years since the Stuxnet virus was revealed, the malicious worm that infected 100,000 computers.
Experts Comments
July 15, 2020
Stuxnet was the first major case in cybersecurity history of digital weaponisation. It showed the magnitude of what was possible with cyber-attacks and the damage that could be done.
While never officially confirmed, it is widely agreed that Stuxnet was politically motivated and nation-state-sponsored due to its level of sophistication. It used four zero-day exploits and hid itself with a seemingly trustworthy digital certificate to go undetected when infecting computers. Furthermore, unlike.....Read More
Stuxnet was the first major case in cybersecurity history of digital weaponisation. It showed the magnitude of what was possible with cyber-attacks and the damage that could be done.
While never officially confirmed, it is widely agreed that Stuxnet was politically motivated and nation-state-sponsored due to its level of sophistication. It used four zero-day exploits and hid itself with a seemingly trustworthy digital certificate to go undetected when infecting computers. Furthermore, unlike many cyber-attacks before it, the aim of Stuxnet was to cause intentional damage as opposed to taking control of a system or stealing data. And while the attack appears to have had a specific target, many other entities found themselves collateral damage of the worm.
The likelihood of attack is increasing fast as the world becomes more digitised and interconnected. It doesn’t matter if your organisations has or hasn’t experienced attack. All should assume they are potential victims. If they don’t take appropriate action to secure their technology, they will not be able to minimise the potential damage – Stuxnet mark 2 could be right around the corner.
What should security teams do to protect themselves from nation-state threats?
There are plenty of resources at the disposal of nation-state attackers. As such, security teams need to capitalise on tools to enable them to gain full visibility over the attack surface, deploy tight network segmentation from the business to the operational technology networks and update network protocols. Security teams must choose vendors that collaborate with local government to ensure they are part of a group sharing vital intelligence and protection methods. Read Less
Linkedin Message
@Gidi Cohen, CEO , provides expert commentary at @Information Security Buzz.
"There are plenty of resources at the disposal of nation-state attackers...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/10th-anniversary-of-the-stuxnet-virus-what-is-its-significance-today
Copy this message and share on your Linkedin profile. Thanks!
Facebook Message
@Gidi Cohen, CEO , provides expert commentary at @Information Security Buzz.
"There are plenty of resources at the disposal of nation-state attackers...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/10th-anniversary-of-the-stuxnet-virus-what-is-its-significance-today
Copy this message and share on your Facebook profile. Thanks!
What do you think of the topic? Do you agree with expert(s) or share your expert opinion below.
Be part of our growing Information Security Expert Community (1000+), please register here.
Be part of our growing Information Security Expert Community (1000+), please register here.
Linkedin Message
@Greg Day, VP & CSO, EMEA, provides expert commentary at @Information Security Buzz.
"Ten Years Since Stuxnet Exposed as Industrial Systems Malware..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/10th-anniversary-of-the-stuxnet-virus-what-is-its-significance-today
Facebook Message
@Greg Day, VP & CSO, EMEA, provides expert commentary at @Information Security Buzz.
"Ten Years Since Stuxnet Exposed as Industrial Systems Malware..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/10th-anniversary-of-the-stuxnet-virus-what-is-its-significance-today