- Cybersecurity:Attack and Defense Strategies
- Yuri Diogenes Erdal Ozkaya
- 366字
- 2021-06-30 19:15:57
Assault
Assault is the most feared stage of any cyber-attack. It is where the attacker does damage exceeding the data and software. An attacker might disable or alter the functioning of the victim's hardware permanently. The attacker focuses on destroying hardware controlled by the compromised systems and computing devices.
A good example of an attack that got to this phase is the Stuxnet attack on Iran's nuclear station. It was the first recorded digital weapon to be used to wreak havoc on physical resources. Just like any other attack, Stuxnet had followed the previously explained phases and had been residing in the facility's network for a year. Initially, Stuxnet is used to manipulate valves in the nuclear facility, causing the pressure to build up and damage a few devices in the plant. The malware was then modified to attack a larger target, the centrifuges. This was achieved in three stages.
The malware was transmitted to the target computers through USB thumb drives, since they were not connected to the internet. Once it infected one of the target computers, the malware replicated itself and spread to the other computers. The malware proceeded to the next stage where it infected some software by Siemens called Step7 that was used to control the programming of logic controllers. Once this software was compromised, the malware finally gained access to the program logic controllers. This allowed the attackers to directly operate various machinery in the nuclear plant. The attackers caused the fast-spinning centrifuges to spin out of control and tear apart on their own.
The Stuxnet malware shows the heights that this phase can reach. The Iranian nuclear facility stood no chance of protecting itself as the attackers had already gained access, escalated their privileges, and stayed out of sight from security tools. The plant operators said that they were receiving many identical errors on the computers, but all virus scans showed that they had not been infected. It is clear that the attackers did a few test runs of the worm within the compromised facility with the valves. They found out that it was effective, and decided to scale up to attack the centrifuges and crash Iran's nuclear weaponry prospects.
- Learning OpenDaylight
- Cybersecurity:Attack and Defense Strategies
- 高性能Linux服務器構建實戰:運維監控、性能調優與集群應用
- Implementing Azure DevOps Solutions
- 混沌工程實戰:手把手教你實現系統穩定性
- RESS Essentials
- Python基礎教程(第3版)
- Social Data Visualization with HTML5 and JavaScript
- 分布式系統設計實踐
- bash shell腳本編程經典實例(第2版)
- Docker容器技術與應用
- Android應用性能優化最佳實踐
- Learn Quantum Computing with Python and IBM Quantum Experience
- 鴻蒙HarmonyOS應用開發入門
- 微信小程序項目開發實戰:用WePY、mpvue、Taro打造高效的小程序