// Posted by BonnieG on 05/28/2015 (7:13 PM)
Unlike typical malware that pulls its data from computer’s hard drive, Stuxnet pulled the data from the memory, which virtually made if impossible to detect. As the article “How Digital Detectives Deciphered Stuxnet, The Most Menacing Malware In History.” pointed out Stuxnet created a new “breed” of spyware. The malware was so malicious that it infected the software of several industrial sites in Iran, including a uranium plant. The worm spread from one computer to another through a LNK file of Windows Explorer. Unbeknownst, to the user, each time the USB stick was installed the worm installed an encrypted file onto the computer. This allowed the intruders to spy on Iran’s systems.
The worm caused cyber warfare, like battles played out in the military. First, the malware wreaked havoc on Microsoft Windows. Then it infected Siemens Step 7 software. The malware was so invasive that the worm would separate in many different directions. That made the detection even more difficult to discover. From what I gathered the malware flowed as such:
- First an infected USB sticks that contained the Stuxnet virus running Microsoft Windows is inserted.
- Then it targeted systems that ran Siemans.
- Stuxnet used the information on the network to filter information.
The malware was so unique and complicated that computer experts, and companies who spend millions of dollars, was unable to detect the virus, and after its detection was unable to immediately stop it. Therefore, if experts are unable to detect spyware using professional knowledge, and sophisticated software, what are the laymen like us to do? We install anti-virus and anti-spy software, hoping we are fully protected against viruses, and Trojan horses. We’re not. Certainly, it allows us some protection from malicious programmers, but it also gives us a false sense of security, as well. Because, in spite of continued warnings, about computer theft, we continue to put valuable information online; from pictures, and locations of our children, to personal account numbers.
It disturbs me, knowing if large companies that spend millions of dollars to detect, and stop malware, are unable to do so, where does that leave us? Certainly, we aren’t going to stop using the computer, because it has now become an integral tool in our lives.