Cyber warfare could be on horizon as threats increase

  • Middle East: Wednesday, October 20 - 2010 at 09:48

Cyber attacks have entered back into public view of late, with the much publicised Stuxnet worm being detected on national infrastructure. Reportedly government-made, this worm is the most well known of a new wave of IT threats, which are a lot more sophisticated than previous attacks.

"For a period of seven or eight years we've see a quiet, non-newsworthy environment. Actually what happened was cybercrime went underground. We moved from an era of notoriety to one of organised crime and theft. What we've seen in the last couple of months is about eight or nine attacks specifically against infrastructure," Kevin Isaac, vice president, emerging region, Symantec tells AMEinfo.com.

SCADA systems are targeted by Stuxnet


Stuxnet is a piece of code which is able to attack the SCADA systems of national infrastructure and potentially disable and alter it. SCADA systems are used in oil and gas, water and power facilities and even control traffic light systems.

As with all attacks, IT security professionals advise companies and countries to be prepared for the worst. "With the kind of serious threats you are seeing today, which Stuxtnet represents, it's even more critical to have a malware strategy, because these are malware and they are driven by malware. If you have a good security system in place then you have the foundation," Keith Maskell, vice president, corporate business, Kaspersky Lab, states.

Reports suggest that the Stuxnet virus, which was found on some systems of the Iranian government, has been developed by governments, which would account for the extra level of sophistication. "Stuxnet is a piece of code with four zero day vulnerabilities built into it, that's the first time we've seen anything like that, it's a very credible and serious threat. This and a few other attacks we've seen around the world are very noteworthy and we need to be paying attention to this," explains Isaac.

However, Kaspersky Labs says detection of the threat is not as big a problem as reports suggest. "Stuxnet is a very interesting threat because it activates only in special conditions. In terms of the sophistication, it is a sophisticated threat, but the method to detecting it is fairly similar to what we already have in our products. Kasperksy already has all the frameworks it needs to tackle the threat. It is innovative from the malware point of view but not innovative from the detection point of view," reveals Maksym Schipka, director, R&D Kaspersky Labs.

Iranian nuclear facility already targeted


The first attack of Stuxnet was discovered in the Iranian nuclear research facility, meaning the potentially catastrophic effects of the virus are huge. While cybercriminals are still looking to steal money and identities, the problem has been overshadowed by this new use of IT viruses.

"Not only are we seeing cybercriminals attack for money and to take identities we are seeing this new threat emerge with cyber warfare and attacks on critical national infrastructure. So I think today more than ever the security and the need to protect ourselves on the internet is becoming a national issue and definitely something which isn't back of mind anymore. The problem with security is it's like insurance; you never want to buy it until it's too late"
Cyber attacks have become increasingly sophisticated
Cyber attacks have become increasingly sophisticated
Enlarge »
Article Options

Disclaimer »

Articles in this section are primarily provided directly by the companies appearing or PR agencies which are solely responsible for the content. The companies concerned may use the above content on their respective web sites provided they link back to http://www.ameinfo.com

Any opinions, advice, statements, offers or other information expressed in this section of the AMEinfo.com Web site are those of the authors and do not necessarily reflect the views of AME Info FZ LLC / 4C. AME Info FZ LLC / 4C is not responsible or liable for the content, accuracy or reliability of any material, advice, opinion or statement in this section of the AMEinfo.com Web site.

For details about submitting your stories, please read the guide - all content published is subject to our terms and conditions