October 01, 2010, 2:01 PM — Stuxnet's inability to stay stealthy may be fall-out from a failure to hit its intended targets last year, security researchers said today.
The worm, which was designed to infiltrate heavy-duty industrial control programs that monitor and manage factories, oil pipelines, power plants and other critical installations, only popped onto researchers' radars this summer, nearly a year after it was likely first launched.
"Obviously, it spread beyond its intended target or targets," said Roel Schouwenberg, a senior antivirus researcher at Kaspersky Lab, one of the two security companies that has spent the most time analyzing Stuxnet.
Most researchers have agreed that Stuxnet's sophistication -- they've called it "groundbreaking" -- means that it was almost certainly built by a well-financed, high-powered team backed by a government. The worm's probable target was Iran, possibly the systems in its budding nuclear power program.
Earlier this week, Iranian officials acknowledged that tens of thousands of Windows PCs had been infected with Stuxnet, including some in place at a nuclear power plant in southwestern Iran. They have denied that the attack had damaged any facilities, however, or that Stuxnet contributed to well-known delays in the reactor's construction.
But if Stuxnet was aimed at a specific target list, why has it spread to thousands of PCs outside Iran, in countries as far flung as China and Germany, Kazakhstan and Indonesia?
"That's something we find puzzling," said Liam O Murchu, operations manager with Symantec's security response, and a co-author of a paper that analyzed the worm's code.
Even though the Stuxnet makers obviously included measures to limit its spread, something went amiss, O Murchu said.
The original infection method, which relied on infected USB drives, included a counter that limited the spread to just three PCs, said O Murchu. "It's clear that the attackers did not want Stuxnet to spread very far," he said. "They wanted it to remain close to the original infection point."
O Murchu's research also found a 21-day propagation window; in other words, the worm would migrate to other machines in a network only for three weeks before calling it quits.
Those anti-propagation measures notwithstanding, Stuxnet has spread widely. Why?
Kaspersky's Schouwenberg believes it's because the initial attack, which relied on infected USB drives, failed to do what Stuxnet's makers wanted.