daily pastebin goal
46%
SHARE
TWEET

Untitled

a guest Sep 14th, 2018 57 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. Buckle in.
  2.  
  3. The most sophisticated software in history was written by a team of people whose names we do not know.
  4.  
  5. It’s a computer worm. The worm was written, probably, between 2005 and 2010.
  6.  
  7. Because the worm is so complex and sophisticated, I can only give the most superficial outline of what it does.
  8.  
  9. This worm exists first on a USB drive. Someone could just find that USB drive lying around, or get it in the mail, and wonder what was on it. When that USB drive is inserted into a Windows PC, without the user knowing it, that worm will quietly run itself, and copy itself to that PC. It has at least three ways of trying to get itself to run. If one way doesn’t work, it tries another. At least two of these methods to launch itself were completely new then, and both of them used two independent, secret bugs in Windows that no one else knew about, until this worm came along.
  10.  
  11. Once the worm runs itself on a PC, it tries to get administrator access on that PC. It doesn’t mind if there’s antivirus software installed — the worm can sneak around most antivirus software. Then, based on the version of Windows it’s running on, the worm will try one of two previously unknown methods of getting that administrator access on that PC. Until this worm was released, no one knew about these secret bugs in Windows either.
  12.  
  13. At this point, the worm is now able to cover its tracks by getting underneath the operating system, so that no antivirus software can detect that it exists. It binds itself secretly to that PC, so that even if you look on the disk for where the worm should be, you will see nothing. This worm hides so well, that the worm ran around the Internet for over a year without any security company in the world recognizing that it even existed.
  14.  
  15. The software then checks to see if it can get on the Internet. If it can, it attempts to visit either http://www.mypremierfutbol.com or http://www.todaysfutbol.com . At the time, these servers were in Malaysia and Denmark. It opens an encrypted link and tells these servers that it has succeeded in owning a new PC. The worm then automatically updates itself with the newest version.
  16.  
  17. At this point, the worm makes copies of itself to any other USB sticks you happen to plug in. It does this by installing a carefully designed but fake disk driver. This driver was digitally signed by Realtek, which means that the authors of the worm were somehow able to break into the most secure location in a huge Taiwanese company, and steal the most secret key that this company owns, without Realtek finding out about it.
  18.  
  19. Later, whoever wrote that driver started signing it with secret keys from JMicron, another big Taiwanese company. Yet again, the authors had to figure out how to break into the most secure location in that company and steal the most secure key that that company owns, without JMicron finding out about it.
  20.  
  21. This worm we are talking about is sophisticated.
  22.  
  23. And it hasn’t even got started yet.
  24.  
  25. At this point, the worm makes use of two recently discovered Windows bugs. One bug relates to network printers, and the other relates to network files. The worm uses those bugs to install itself across the local network, onto all the other computers in the facility.
  26.  
  27. Now, the worm looks around for a very specific bit of control software, designed by Siemens for automating large industrial machinery. Once it finds it, it uses (you guessed it) yet another previously unknown bug for copying itself into the programmable logic of the industrial controller. Once the worm digs into this controller, it’s in there for good. No amount of replacing or disinfecting PCs can get rid of the worm now.
  28.  
  29. The worm checks for attached industrial electric motors from two specific companies. One of those companies is in Iran, and the other is in Finland. The specific motors it searches for are called variable-frequency drives. They’re used for running industrial centrifuges. You can purify many kinds of chemicals in centrifuges.
  30.  
  31. Such as uranium.
  32.  
  33. Now at this point, since the worm has complete control of the centrifuges, it can do anything it wants with them. The worm can shut them all down. The worm can destroy them all immediately — just spin them over maximum speed until they all shatter like bombs, killing anyone who happens to be standing near.
  34.  
  35. But no. This is a sophisticated worm. The worm has other plans.
  36.  
  37. Once it controls every centrifuge in your facility… the worm just goes to sleep.
  38.  
  39. Days pass. Or weeks. Or seconds.
  40.  
  41. When the worm decides the time is right, the worm quietly wakes itself up. The worm randomly picks a few of those centrifuges while they are purifying uranium. The worm locks them, so that if someone notices that something is wrong, a human can’t turn the centrifuges off.
  42.  
  43. And then, stealthily, the worm starts spinning those centrifuges… a little wrong. Not a crazy amount wrong, mind you. Just, y’know, a little too fast. Or a little too slow. Just a tiny bit out of safe parameters.
  44.  
  45. At the same time, it increases the gas pressure in those centrifuges. The gas in those centrifuges is called UF6. Pretty nasty stuff. The worm makes the pressure of that UF6, just a tiny bit out of safe parameters. Just enough that the UF6 gas in the centrifuges, has a small chance of turning into rock, while the centrifuge is spinning.
  46.  
  47. Centrifuges don’t like running too fast or too slow. And they don’t like rocks either.
  48.  
  49. The worm has one last trick up its sleeve. And it’s pure evil genius.
  50.  
  51. In addition to everything else it’s doing, the worm is now playing us back a 21-second data recording on our computer screens that it captured when the centrifuges were working normally.
  52.  
  53. The worm plays the recording over and over, in a loop.
  54.  
  55. As a result, all the centrifuge data on the computer screens looks completely fine, to us humans.
  56.  
  57. But it’s all just a fake recording, produced by the worm.
  58.  
  59. Now let’s imagine that you are responsible for purifying uranium using this huge industrial factory. And everything seems to be working okay. Maybe some of the motors sound a little off, but all the numbers on the computer show that the centrifuge motors are running exactly as designed.
  60.  
  61. Then the centrifuges start breaking. Randomly, one after another. Usually they die quietly. Rarely though, they make a scene when they die. And the uranium yield, it keeps plummeting. Uranium has to be pure. Your uranium is not pure enough to do anything useful.
  62.  
  63. What would you do, if you were running that uranium enrichment facility? You’d check everything over and over and over, not understanding why everything was off. You could replace every single PC in your facility if you wanted to.
  64.  
  65. But the centrifuges would go right on breaking. And you have no possible way of knowing why.
  66.  
  67. And on your watch, eventually, about 1000 centrifuges would fail or be taken offline. You’d go a little crazy, trying to figure out why nothing was working as designed.
  68.  
  69. That is exactly what happened.
  70.  
  71. You would never expect that all those problems were caused by a computer worm, the most devious and intelligent computer worm in history, written by some incredibly secret team with unlimited money and unlimited resources, designed with exactly one purpose in mind: to sneak past every known digital defense, and to destroy your country’s nuclear bomb program, all without getting caught.
  72.  
  73. To have one piece of software do any ONE of those things would be a small miracle. To have it do ALL of those things and many more, well…
  74.  
  75. … the Stuxnet worm would have to be the most sophisticated software ever written.
  76.  
  77. Sources here, here, and here.
  78.  
  79. EDIT: this article I wrote is awesome. Share it, people.
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
 
Top