10 years after Stuxnet, the most powerful cyberweapon is now social media

A decade ago, the landscape of war changed forever.

Recommended Videos

On July 15, 2010, researchers discovered a massive malware worm installed in the industrial control systems of Iran’s nuclear development sites, where uranium was being enriched. The worm, more complex than any malware seen before, came to be known as Stuxnet.

But the prohibitive cost and manpower of developing dangerous targeted malware like Stuxnet means that many nation-states have started leaning on a new cyberweapon of choice: Social media.

A complex and dangerous tool

At the time, Stuxnet was revolutionary. It bridged the gap between the digital and physical worlds in a way that hadn’t been done up to that point, said Ryan Olson, vice president of threat intelligence at Palo Alto Networks. “This was a significant event,” he said.

Kim Zetter, a journalist and one of the foremost experts on the Stuxnet virus, said that it wasn’t just the virus’s complexity or sophistication that was impressive, it was what virus targeted and how. “It targeted systems that weren’t connected to the internet,” she told Digital Trends. “And it introduced to the security community, and the world, vulnerabilities that exist in critical infrastructure systems.”

Stuxnet was a totally new paradigm in terms of what could now be accomplished,” said Axel Wirth, chief security strategist at MedCrypt, a cybersecurity company specializing in medical devices. “The methodology used to penetrate its target environment was much better planned than any other piece of malware used before.”

It’s thought that the virus found its way into Iran nuclear facilities via a thumb drive. From there, the virus was able to make a copy of itself and hide in an encrypted folder. It then lay dormant, Wirth told Digital Trends. The worm would activate when a specific configuration of systems only found in Iran was turned on. Ultimately, experts believed the virus caused significant damage to the Natanz nuclear enrichment site in Iran.

Strong evidence points to Stuxnet’s development being a joint effort between the U.S. and Israel, according to the Washington Post, although neither country has ever claimed responsibility.

Cyberweapons, however, always have an unintended side effect when they’re discovered.

Zero Days - Official Trailer

“The difference between an offensive cyberweapon and, say, the Manhattan Project, is that a nuclear bomb doesn’t leave defensive schematics scattered all over the landscape,” said Chris Kennedy, former director of cyberdefense at both the Department of Defense and the U.S. Treasury. “Cyberweapons do.”

In other words, once Stuxnet was discovered, it was hard to contain. Experts and hackers could look at the code, dissect the worm, and take out parts of it to use for themselves. Many cyberweapons found since Stuxnet have had parts of the Stuxnet code in them, although these new tools aren’t nearly as sophisticated, Kennedy said.

“Billions of dollars went into creating Stuxnet and became publicly consumable information,” said Kennedy, who is currently the chief information security officer at cybersecurity firm AttackIQ. “That kind of screws with the value of the investment.”

A better return on investment

Social media manipulation can also be effective at destabilizing or attacking foes — and is much cheaper.

“Social media is a lower form of attack,” said Kennedy, “but it’s easier to do. You just get a bunch of not-as-smart people to pump false information into Facebook and the analytics take it away. Now, attacks like Stuxnet will be reserved for specialized goals because they’re so expensive and challenging to create.”

Kennedy said that whatever buzzword could be used to talk about the Russian influence in the 2016 elections, “that’s the new Stuxnet.”

“Rather than attacks on systems or on individual computers, these are attacks on societies and economies.”

“It’s easier, cheaper, and has a much more brand effect,” he said.

Wirth told Digital Trends that cyberattacks are now “broader” in scope.

“Rather than attacks on systems or on individual computers, these are attacks on societies and economies,” he said. “Traditional tools have been augmented by social media attacks and misinformation campaigns.”

“The future is combined,” said Kennedy, in terms of what cyber warfare could look like. “You use a social media campaign for propaganda and influence to shape local populations, then you use cyberweapons to affect specific targets. And if that doesn’t work, then we bring in the troops and start blowing stuff up.”

I'm a multimedia journalist currently based in New England. I previously worked for DW News/Deutsche Welle as an anchor and…
RTX 4090 owners are in for some bad news

Nvidia's RTX 4090 remains the undisputed most powerful GPU on the market right now, despite being a year-and-a-half old. As such, you might think that reselling it later should be a breeze, not to mention that it should net you a nice amount of money -- but that is not always the case.

Wccftech reports that one owner of an MSI RTX 4090 tried to use the Micro Center GPU Trade-In Program to get some money back, and the GPU was valued at just $700 -- a mere 36% of the total cost of the graphics card.

Read more
Boston Dynamics retires its remarkable Atlas robot

Farewell to HD Atlas

Boston Dynamics’ Atlas robot has been impressing us with its acrobatics and other antics over the last decade, but the company just announced that it's retiring the bipedal bot.

Read more
So THAT’S why Boston Dynamics retired its Atlas robot

All New Atlas | Boston Dynamics

“Til we meet again, Atlas” was the closing message on Boston Dynamics’ video on Tuesday that announced the retirement of the hydraulic-powered version of its remarkable bipedal robot.

Read more