Attacks/Stuxnet
CRITICAL SEVERITY

Stuxnet

2010
ics attack

First cyberweapon - destroyed Iranian nuclear centrifuges.

infrastructuregovernment

!What Happened

US/Israel worm targeted Siemens PLCs via USB. Destroyed ~1000 centrifuges.

Vulnerability Exploited

Multiple Windows 0-days + Siemens Step 7 bugs

Attack Flow

1
delivery

USB Infection

Spreading via USB

[USB] Autorun executing...
2
exploitation

Zero-Days

Multiple 0-days used

[0DAY] Privilege escalation
3
installation

PLC Injection

Modifying centrifuge code

[PLC] Code injected
4
actions

Sabotage

Destroying centrifuges

[DAMAGE] Centrifuges destroyed

💥Impact

~1000 centrifuges destroyed. Nuclear program delayed 2+ years.

Records Compromised
0
Financial Cost
$1+ billion (nuclear program delay)

🔧Technical Details

Target System
Natanz PLCs
network_device • Siemens
SCADA
Attacker Profile
Nation-State
workstation
Vulnerability / CVE
Multiple Windows 0-days + Siemens Step 7 bugs

📅Attack Timeline

Initial Attack
2010
Attack initiated and vulnerability exploited
Discovery & Impact
Shortly after 2010
~1000 centrifuges destroyed. Nuclear program delayed 2+ years.
Response & Mitigation
Remediation Phase
Enhanced ICS security globally.

🎯Is This Attack Still Relevant Today?

Attacks on Industrial Control Systems remain a critical concern. The techniques demonstrated in Stuxnet have influenced both offensive and defensive strategies in protecting critical infrastructure worldwide.

✓ Mostly Mitigated

💡Key Takeaways

  • Air gaps insufficient. ICS security critical.
  • Defense in depth with multiple security layers is essential
  • Key defense: USB Device Control Policy - Prevents initial USB-based infection

Defense Applied

Enhanced ICS security globally.

Lessons Learned

Air gaps insufficient. ICS security critical.

Attacker Tools

Stuxnet
ICS-targeting worm

Defense Options

USB Device Control Policy
Block unauthorized USB devices from executing on workstations
PLC Code Integrity Monitoring
Verify PLC ladder logic against known-good baseline
Enforced Air Gap with Physical Keys
Physical disconnection with key-locked access ports
Siemens Step 7 Update
Apply vendor security patches to SCADA software

MITRE ATT&CK

Tactics
Initial AccessImpact
Techniques
T1091