The Remarkable 10th Anniversary of Stuxnet

Analytical Summary of the SolarStorm Cyber Espionage Campaign

  • Selján Gábor
doi: 10.32565/aarms.2020.3.6

Abstract

It has been ten years since Stuxnet, a highly sophisticated malware that was originally aimed at Iran’s nuclear facilities, was uncovered in 2010. Stuxnet is considered to be the first cyber weapon, used by a nation state threat actor in a politically motivated cyberattack. It has significantly changed the cybersecurity landscape, since it was the first publicly known malware that could cause physical damage to real processes or equipment. Its complexity and level of sophistication, due to the exploitation of four different zero-day vulnerabilities in Windows and the usage of two stolen certificates, has triggered a paradigm shift in the cybersecurity industry. The recently uncovered cyber espionage campaign known as SolarStorm is a worthy anniversary celebration for Stuxnet. Especially because now the tables have turned. This campaign targeted the United States Government and its interests with a highly sophisticated supply chain attack through the exploitation of the SolarWinds Orion Platform used by thousands of public and private sector customers for infrastructure monitoring and management. In this article, I attempt to summarise the key points about the malware deployed in the SolarStorm campaign that can be drawn from reports available at the time of the writing.

Keywords:

backdoor cyber security cyber warfare malware supply chain attack

How to Cite

Selján, G. (2021) “The Remarkable 10th Anniversary of Stuxnet: Analytical Summary of the SolarStorm Cyber Espionage Campaign”, AARMS – Academic and Applied Research in Military and Public Management Science. Budapest, 19(3), pp. 85–98. doi: 10.32565/aarms.2020.3.6.

Downloads

Download data is not yet available.