Category Archives: Site Security
A Stuxnet Malware FAQ and How to Avoid It
Stuxnet is a new piece of malware that is spreading widely through the use of USB flash drives. It is starting to be quite a danger, especially in industrial plants, and many in the security business are getting very nervous. What follows is an FAQ about the Stuxnet malware.
How does Stuxnet spread?
Stuxnet spreads through USB devices. A recently discovered Microsoft Windows vulnerability has been found to allow a program to run just by browsing to a folder that contains a shortcut to it, or a “.lnk” file. Once the worm runs it scans to see if the computer is running software created by a company known as Siemens, which is very popular in certain industries. If this is the case, the worm is able to install itself on the victim computer. It will infect all future removable media that is connected to the computer and installs a rootkit, a very sophisticated type of software that deletes all record of the worm existing on the computer. After that the computer continues to steal as much data as possible from the computer and transmit it back to a remote location.
What does Stuxnet do?
Stuxnet is considered by many people to be the first-ever “control system” malware. What this means is that it has the capability of infecting control systems for large companies and factories that use software created by Siemens. Unfortunately, this software is very widely used, especially in large industrial manufacturing organizations, small and large utilities, and even defense systems. In one case it was found that this software could infect nuclear-powered aircraft carriers.
How widespread is Stuxnet and where is it most common?
At the moment Stuxnet is not that widespread. It is most common in India, Indonesia, Iran, Pakistan, Afghanistan, the United States, and Malaysia, in that order. However, it has the potential to spread very rapidly. It only affects computers running Siemens software, but computers without that software can still act as “carriers,” infecting other removable media that is inserted into them. Other countries have seen infections, but mostly they have been localized and have not caused any damage so far.
How dangerous is Stuxnet?
This is always the big question with a large virus outbreak. Right now Stuxnet is not that dangerous. Unfortunately, it is targeted at “Control Systems.” Siemens is most known for making software for sophisticated systems used in such areas as the military, large industrial plants, and utility plants. If any of these were to be infected the damage could be irreparable. The infection is clearly tailored to steal confidential information and possibly shut down “smart grids.” Therefore, while it is not a danger to consumers, any large corporation or plant must be very careful to avoid this infection.
A Stuxnet Malware FAQ and How to Avoid It
Stuxnet is a new piece of malware that is spreading widely through the use of USB flash drives. It is starting to be quite a danger, especially in industrial plants, and many in the security business are getting very nervous. What follows is an FAQ about the Stuxnet malware.
How does Stuxnet spread?
Stuxnet spreads through USB devices. A recently discovered Microsoft Windows vulnerability has been found to allow a program to run just by browsing to a folder that contains a shortcut to it, or a “.lnk” file. Once the worm runs it scans to see if the computer is running software created by a company known as Siemens, which is very popular in certain industries. If this is the case, the worm is able to install itself on the victim computer. It will infect all future removable media that is connected to the computer and installs a rootkit, a very sophisticated type of software that deletes all record of the worm existing on the computer. After that the computer continues to steal as much data as possible from the computer and transmit it back to a remote location.
What does Stuxnet do?
Stuxnet is considered by many people to be the first-ever “control system” malware. What this means is that it has the capability of infecting control systems for large companies and factories that use software created by Siemens. Unfortunately, this software is very widely used, especially in large industrial manufacturing organizations, small and large utilities, and even defense systems. In one case it was found that this software could infect nuclear-powered aircraft carriers.
How widespread is Stuxnet and where is it most common?
At the moment Stuxnet is not that widespread. It is most common in India, Indonesia, Iran, Pakistan, Afghanistan, the United States, and Malaysia, in that order. However, it has the potential to spread very rapidly. It only affects computers running Siemens software, but computers without that software can still act as “carriers,” infecting other removable media that is inserted into them. Other countries have seen infections, but mostly they have been localized and have not caused any damage so far.
How dangerous is Stuxnet?
This is always the big question with a large virus outbreak. Right now Stuxnet is not that dangerous. Unfortunately, it is targeted at “Control Systems.” Siemens is most known for making software for sophisticated systems used in such areas as the military, large industrial plants, and utility plants. If any of these were to be infected the damage could be irreparable. The infection is clearly tailored to steal confidential information and possibly shut down “smart grids.” Therefore, while it is not a danger to consumers, any large corporation or plant must be very careful to avoid this infection.
Techniques to Clear away Spyware That does not Want To Depart Your Computer
There are times that you get some spyware on your system that just won’t let up. It seems as if nothing that you do is actually getting it off your system making it hard to use your computer safely as you are worried about what it’s looking at on your system. There are some techniques that you can use that will help you get rid of spyware that is difficult to take off the system.
The first is that you need to use a spyware scanner that will do a system scan while the computer boots up in safe mode. In safe mode, at times the spyware can’t turn on or be activated which sometimes makes it hard to get off the system. If you can do the scan in safe mode, at times it’s easy to remove the problem.
Other times you can simply end the process that the spyware is running under in the task manager. If you end the process, you can then remove it. Sometimes spyware is designed so that it can only be removed if it’s disabled. This is one trick that lets you do that easily.
Clean your registry. Sometimes spyware will embed itself deep into your computer’s registry causing problems. If clean up the registry with a cleaner tool, it can get rid of this problem for you better.
Do a search on the internet for the specific piece of spyware that is giving you trouble. Generally there is someone in a blog or forum who has a creative step by step solution to fixing the problem.
One option is to back up all your files on your machine and consider going back to a previous save point on your machine. There is a chance that the previous restore point doesn’t have the spyware meaning you can avoid having it at all anymore by going back.
Sometimes spyware is hard to remove from your system. Learn a few strategies to removing the tough spyware that won’t go away.