Two security researchers, working at home in their spare time, have created a cyberweapon similar to the sophisticated Stuxnet computer worm that was discovered last year to have disrupted computer systems running Iran’s nuclear program.
The private efforts by Dillon Beresford and Brian Meixell are raising concerns among U.S. government officials that hackers will launch copycat cyber-attacks that could cripple computer controls at industrial sites such as refineries, dams and power plants.
Officials at the Department of Homeland Security were so distressed by the researchers’ findings that they asked the two men to cancel a planned presentation at a computer security conference in Dallas last week called TakeDownCon.
“They requested that I not share the data, but it was absolutely my decision to cancel,” Mr. Beresford told The Washington Times. Homeland Security “in no way tried to censor the presentation, and the conference organizers were very supportive. … We did the right thing.”
Initial analysis of the 2009 Stuxnet attack on Iran suggested that replicating it would require the resources of a nation-state or large organization and detailed information on how the target computer system was set up. The origin of Stuxnet has not been discovered.
But Mr. Beresford said he developed the cyberweapon “in my bedroom, on my laptop” in 2 1/2 months. The malicious software, or malware, was tested on equipment made by Siemens, the German-based industrial giant that makes the system that was attacked by the Stuxnet worm.
Siemens products - known as industrial control systems - are used in thousands of power stations, chemical plants and other industrial settings worldwide. Stuxnet was designed to make the machinery controlled by an industrial control system destroy itself.
Once Siemens saw Mr. Beresford’s presentation, the company renewed laboratory work on software patches for controllers that were developed after Stuxnet, Mr. Beresford said. He said he worked last week with officials from a special Homeland Security unit in charge of protecting industrial computer programs but was becoming impatient with Siemens’ response.
“This is another egregious example of a vendor trying to minimize the impact of multiple security vulnerabilities in their products and being somewhat evasive about the truth,” he said, noting that the company tried to downplay concern in its public statements and had yet to publish a fix for the flaws he had found.
“The clock is ticking, and time is of the essence. I expect more from a company worth $80 billion, and so do [their] customers,” Mr. Beresford said.
Siemens spokesman Robert Bartels told The Times that the company is testing fixes and expects to release them “within the next few weeks.”
Homeland Security Department officials asked the researchers to delay their presentation until special repair measures aimed at patching security holes they identified are fully developed. They praised the researchers for postponing public release of data that hackers could use to attack computers that control critical infrastructure around the world.
“Responsible disclosure … does not encourage the release of sensitive vulnerability information without also validating and releasing a solution,” a Homeland Security official said in an email.
The disclosure that independent researchers could replicate Stuxnet - which security specialists said at the time likely required a large design team to produce and an industrial plant for testing - will increase concerns about the proliferation of advanced cyberweapons that could cause large-scale death and destruction if unleashed by terrorist groups, criminal gangs or foreign governments.
• Shaun Waterman can be reached at firstname.lastname@example.org.
Copyright © 2023 The Washington Times, LLC. Click here for reprint permission.
Click to Read More and View Comments
Click to Hide
Please read our comment policy before commenting.