We found a match
Your institution may have access to this item. Find your institution then sign in to continue.
- Title
The Remarkable 10<sup>th</sup> Anniversary of Stuxnet: Analytical Summary of the SolarStorm Cyber Espionage Campaign.
- Authors
SELJÁN, Gábor
- Abstract
It has been ten years since Stuxnet, a highly sophisticated malware that was originally aimed at Iran's nuclear facilities, was uncovered in 2010. Stuxnet is considered to be the/irst cyber weapon, used by a nation state threat actor in a politically motivated cyberattack. It has signiftcantly changed the cybersecurity landscape, since it was the first publicly known malware that could cause physical damage to real processes or equipment. Its complexity and level of sophistication, due to the exploitation of four different zero-day vulnerabilities in Windows and the usage of two stolen certificates, has triggered a paradigm shift in the cybersecurity industry. The recently uncovered cyber espionage campaign known as SolarStorm is a worthy anniversary celebration for Stuxnet. Especially because now the tables have turned. This campaign targeted the United States Government and its interests with a highly sophisticated supply chain attack through the exploitation of the SolarWinds Orion Platform used by thousands of public and private sector customers for infrastructure monitoring and management. In this article, 1 attempt to summarise the key points about the malware deployed in the SolarStorm campaign that can be drawn from reports available at the time of the writing.
- Subjects
IRAN; ESPIONAGE; CYBERTERRORISM; PUBLIC sector; ANNIVERSARIES; NUCLEAR facilities; LANDSCAPE changes
- Publication
AARMS: Academic & Applied Research in Military & Public Management Science, 2020, Vol 19, Issue 3, p85
- ISSN
2498-5392
- Publication type
Article
- DOI
10.32565/aarms.2020.3.6