Kevin Coleman

Those behind Stuxnet attack may not be who we think they are

Investigative tools no match for sophisticated attacks

Yes, this is yet another article about Stuxnet. But it is unlike many of the others that have been written. Just run a Google search on Stuxnet, and you will see what I mean. In preparing for this article, I got 3.8 million Google results when I searched for "Stuxnet." I bet there have been a few added since then.

In looking at the search results, a large percentage of the articles deal with the technical aspects of the Stuxnet attack on Iran's nuclear program. A similar percentage deals with the political aspects and reasons behind the Stuxnet cyberattack, in addition to the time margin created by the attack. However, there is another area that has become quite popular and is arguably the fastest-growing area of the Stuxnet subject matter. This has been a favorite topic of spy thrillers and espionage stories throughout history: who done it?

A number of articles have been posted that discuss attribution for this cyberattack. Attribution is tricky — I’ve been there and made that mistake. The articles actually named China, Israel, United Kingdom and the United States as being behind what has come to be known as the most sophisticated cyber weapon and attack seen to date, at least in the public domain.

Although it's true that all of these countries have the capacity and know-how needed to create Stuxnet, they also have the technical knowledge needed to cloak their activities and mask the identities often found in the code artifacts of cyber weapons. It is amazing to see the number of small and midsize organizations with limited resources that release articles and reports that name who is behind Stuxnet. The egos and attitudes that combine to make the authors believe they have the intelligence assets, resources, knowledge and capabilities to compete with the thought leaders in the weaponry and strategies of digital conflict that created Stuxnet are gigantic.

Do they really think they have what's necessary to unravel the mysteries behind the Stuxnet code if it were developed by China’s State Security Ministry, Israel’s Mossad, Britain’s MI6 or our CIA? These same reporters and organizations, when pushed for evidence, offer little or no substance behind their attribution, and when cornered, most fall back to the position, “They [meaning who the security firm believes was behind the attack] had motive.”

In July 2010, the House Science and Technology Committee's Technology and Innovation Subcommittee held a hearing and discussed cyberattack attribution technology and its importance. The subcommittee discussed current and future research and development needs. There was little disagreement that the tools and techniques needed for attribution are in the very early stage of development and are gradually evolving. The big problem is these tools are evolving slower than the advanced threats we are seeing introduced into the cyber domain on a regular basis. Having stellar cyber attribution capabilities will serve as a big deterrent to acts of cyber aggression. Today, there is little concern about attribution for those nations in the top tier of offensive cyber capabilities.

The Stuxnet cyberattack has all the makings of a 21st-century spy thriller, but the harsh reality is that this is just a glimpse of what's to come. Stuxnet should serve as an early warning to all industrialized nations about the risk that cyberattacks pose to our infrastructure and way of life. By most accounts, it was successful and achieved its mission — delaying Iran’s nuclear enrichment efforts. It is highly unlikely that we will find out anytime soon who was behind Stuxnet. There is a short list of those who have the intelligence assets needed to carry this out and infect the Iranian nuclear equipment in addition to the technical assets to design and develop the code, plus all the goodies they included that mislead and misdirect all those investigating and think they know who was behind it. After all this, I can’t wait for the movie.

Reader Comments


This article is right on the mark, there are a lot of arm chair generals in the media who proclaim to the authority on this topic, but in reality, they just package up what they have heard from second and third hand sources and don't know what the hell they are talking about. Unless they are actually them dissecting the code, looking for trends, and conducting detailed analysis of how it operates, they need not talk like they are the "authoritive expert" on the situation. It takes an experienced and clever programmer to dissect someone else's work and really discover every little thought and intricate detail that went in to developing that thing.

Thu, Mar 3, 2011

Bravo! Well written!! Especially the comment on EGOS!!!

Thu, Mar 3, 2011 TableTalk

We have a profile of Stuxnet. If anyone is interested, they can read it here:

Wed, Mar 2, 2011 TCMSOLS

Stuxnet was a warning, they were told before hand that an attack was going to take place. Even with prior warning they could not prevent it, so after the fact they can still not prevent it. The more reactors they build the greater target acquisition for an entry point. Within 24 hours the Iranian nuclear network can be infiltrated. So in the event of hostilities by Iran they will face numerous Chernobyl's. Overriding the safety system and shutting down the cooling system. People say it is dangerous and irresponsible however when Syria gave Hizbullah Scuds to fire at Dimona no one complained. What's the difference. If we wanted to blow up Bushehr it would have been blow up. The warning is this Stuxnet 2 they cannot get rid of it and it will spread over the whole network then only a activation code is required, that's how it is done, it is in the system dormant waiting for the activation code. The warning was the theory, Stuxnet was the practical. We got plans to for military applications an enemy nuclear powered submarine the whole fleet like the Kursk, without firing a shot via the activation code.

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Your Name:(optional)
Your Email:(optional)
Your Location:(optional)
Please type the letters/numbers you see above