Академический Документы
Профессиональный Документы
Культура Документы
Page 1 of 2
http://www.hydrocarbonprocessing.com/Article/3116037/Chevron-says-computer-network... 1/27/2013
Chevron says computer network was infected by anti-Iranian virus Stuxnet | Hydrocarbon... Page 2 of 2
Millions of the devices have been sold world-wide, exposing the industrial companies that depend on them to the
risk of being infected.
US officials, meanwhile, blame Iranian hackers with government ties for the so-called Shamoon virus that destroyed
data on 30,000 computers belonging to Saudi Aramco in August. Defense officials said a Qatari natural-gas
company called Rasgas was attacked in August.
The incidents show how cyberattacks have escalated in speed and scale during the past few months.
"All told, the Shamoon virus was probably the most destructive attack that the private sector has seen to date," US
Secretary of Defense Leon Panetta said in an Oct. 11 speech at a Business Executives for National Security dinner.
Aramco said it quickly recovered from the August attack, but expects more such threats in the future. Rasgas said
the August attack had no impact on its operations.
"The real worry that a lot of us have been talking about for a year or so is that instead of just stealing information,
[hackers are] gaining control of target systems so that they can cause" physical damage, said Ed Skoudis, who
teaches cybersecurity classes at the SANS Institute, a private organization that trains cybersecurity experts and
conducts information-security research.
Employees who have a deep understanding of cybersecurity and their company's systems are the only defense
against viruses like Stuxnet, which often target vulnerabilities that securities researchers haven't yet identified or
software vendors haven't patched, said Alan Paller, who founded SANS.
He said those employees need to understand malware and techniques for fighting them, such as deep-packet
inspection, which involves a very detailed examination of traffic on a computer network.
They must also have a deep knowledge of what network traffic should look like.
"There are probably only 18 to 20 people in the [US] who have those fundamental skills," he said.
Unleashing potent cyberweapons involves the risk of blowback. "Somebody could recover malware assets, tweak
them and use them" against their creators, according to Skoudis. He said portions of the Stuxnet code already have
been used to commit financial cybercrimes, such as stealing credit-card data and bank-account information.
The US government's purported link to Stuxnet makes American companies an even bigger target, said Mr. Paller.
Hackers last summer went from stealing information to using cyberattacks to cause destruction, he said.
Stuxnet "opened Pandora's box," he added. "Whatever restraint might have been holding damaging attacks back is
gone."
In the end, companies are left to clean up the mess associated with viruses such as Stuxnet.
"We're finding it in our systems, and so are other companies," said Chevron's Mr. Koelmel. "So now we have to deal
with this."
http://www.hydrocarbonprocessing.com/Article/3116037/Chevron-says-computer-network... 1/27/2013