转一篇很有意思的文章

West Life

最近有点忙
VIP
注册
2010-07-16
消息
6,980
荣誉分数
646
声望点数
123
没发一枪一弹,M国玩残伊朗的核武计划
解滨
冷战结束后,世界总体趋向太平。但树欲静而风不止,威胁人类安全的新问题接踵而来。这其中最棘手的,一个是恐怖主义,另一个是核武扩散。前一个问题在多国的合作下,趋于好转。后一个问题,由于多国各怀鬼胎,至今不见成效。其中有两个流氓国家的核武计划受到国际的关注。一个是北韩,另一个是伊朗。
北韩发展核武纯粹是作秀加讹诈,搞的是钚弹,技术起点比较低,核武发展前途也比较有限。和北韩的小打小闹不一样,伊朗野心勃勃,踌躇满志,自己提取浓缩铀。铀弹周期长,技术门槛高,但发展无量。所以这是西方各国和以色列的一块心病。但伊朗是石油输出大国,西方国家没有太多的回旋空间。谈判数年没有进展,而传统的军事手段又羁绊太多,伊朗核武问题犹如烫手山芋,因此必须另寻一高策,既可事半功倍,迟滞伊朗核计划,又不至于陷入另外一场没有胜利希望的战争,还不会带来人员伤亡,万一失手也能悄悄蒙混过去,不会导致国内外民众的强烈抗议。这等好事存在吗?
123011osd0wipcq7qydncy.jpg

存在!山重水复疑无路,柳暗花明又一村。 MI两国专家们绞尽脑汁,终于找到了一个万全之策,这就是与其杨扬止沸,不如釜底抽薪。此计运筹帷幄于三年之前。时至今日已大见成效。如今我们不再见美国在安理会强压各国制裁伊朗的咄咄逼人之势,也不见美军在伊朗附近大兵压境之威,更不见美国官员四处奔走,利诱各国说服伊朗放弃核武计划之外交努力。美以两国官员凡谈起伊朗核武一事,必满面春风,胸有成竹,如数家珍。 MI两国到底施了何锦囊妙计,不见刀光剑影,没有导弹呼啸,让伊朗的核武计划玩完?
玩完未必,玩残是肯定的。
这件事搞IT的网友们数月前早有听说。但直到今天也没有谁站出来拍着胸脯邀功请赏,美以两国对这类质询也不置可否。去年年底,伊朗官员还否认离心机遭到严重破坏。但后来的各种来自伊朗官方的消息证明了他们最不想看到的事情确实已经发生。一言蔽之,本来伊朗今年年底就可以实现核爆,但这一计划已被推迟到至少2015年。今后这4年间风云变幻,夜长梦多,谁知会不会又是噩梦连连,祸事迭起,好事难成呢?
M国是如何巧施妙计玩残伊朗的核武计划的呢?说起来很简单:有一枚专门针对伊朗纳坦兹(Natanz)的浓缩铀工厂的数字导弹被用来一举摧毁那里诸多的用来把铀235分离出来的离心机。这枚数字导弹就是去年困扰了世界各国工业界,曾让诸位IT专家惊出一身冷汗,吓得屁滚尿流,叫国际所有的防毒专家都不知所措的的一个名叫Stuxnet的计算机蠕虫。
122201ncupx0wuerwwhuuc.jpg

全世界的信息安全专家在剖析了Stuxnet之后,都为其设计之完美,实施之巧妙,隐蔽之深奥,攻击之精确,防备之强悍惊叹不已。它达到了世界计算机蠕虫之顶峰。它可是有史以来最为复杂和精确的计算机恶意代码。
此等惊人之作,绝非高中生躲在地下室瞒着老妈能完成。去年我在我的“谷歌事件,中国亮剑”一文中就指出:黑客有民间与官方之分。两者区别在以下三个方面:(1)民间的黑客基本上是小打小闹,打不赢就走,打赢了赶快去黑客社区报功,风光无限。政府的黑客则有高度的组织性和多方面协调性,事成之后保持沉默,无名英雄。(2)民间黑客多为钱财所驱–偷信用卡,盗窃银行账户,骗财为普遍行为。官方黑客则不为钱财所动,政治动机突出。(3)民间黑客多技艺良莠不齐,且常露出马脚。官方黑客是专业的,技艺精良,整体水平高超,且招法特殊,来无影去无踪,极难捕捉。
没有谁会相信任何一个民间黑客或黑客组织有能力设计出Stuxnet这种杰出的作品。如果说去年来自中国针对谷歌的蠕虫Aurora是一只狐狸的话,那么Stuxnet就是一头电脑控制的雄狮。
随着时间的推移,有关Stuxnet的秘密被揭开。根据多个可信的情报资源,伊朗的核武计划是被这样一步步玩残的。
生产铀235需要高速离心机,而这种离心机的控制系统的关键部件是一种变频器。 M国和I国的特工人员得知这种特殊的变频器的制造商在世界上只安装到了两个国家,一个是芬兰,另一个是伊朗(在芬兰那个不是用来生产核材料的)。这个消息使MI两国的情报机构欣喜若狂。下一步,他们开始打探伊朗使用了什么计算机程序来控制这种变频器,进而控制离心机来浓缩铀235。这个不难,有段时间伊朗愿意让IAEA监视其浓缩铀的生产。一查,原来伊朗使用的是西门子公司的Simatic WinCC SCADA(数据采集与监控)系统。
也不知中了什么魔法,2008 年初,西门子公司居然同意让M国爱州的某国家实验室检查西门子公司用来控制操作工业机械的电脑控制程序。这个过程,就是我们搞这一行的所说的“Code Review”,即阅读代码。懂行的都知道,这和交出全部家当一模一样,甚至比大闺女交出贞操还严重。微软至今不愿公布源代码,自有其的道理。不出意料,该实验室发现了西门子控制程序的两个安全漏洞。不过,这位来头不小的老兄并没把这一发现立即告诉西门子,而是告诉了某机构。
不久,打击伊朗的数字精确导弹就在一群电脑高手的合作下完工了。
可如何试验这枚数字导弹的效用呢?
不久,在I国的 Negev 沙漠中的 Dimona 群楼里,安装了和伊朗一模一样的变频器、P-1离心机和电脑控制系统。这里被赋予了新的使命–为了打击伊朗的核武器发展,M国和I国的联合团队在这里进行着秘密的测试。正是在 Dimona 这里,两国联军测试了 Stuxnet 蠕虫的效果,这个专门为了摧毁伊朗离心器的电脑蠕虫。
1224252it88xtbxxxp2yxy.jpg

经过反复修改和试验,Stuxnet越来越完善和精锐,可以说是到了尽善尽美的程度。
那么,怎么把这枚数字导弹精确地投放到对方的工厂里去,而又不伤及无辜呢?
核武工厂的计算机系统是不和互联网连接的。这是个大难题。不过这个难题俺一猜就猜到了是如何解决的。其实一点也不难。先对伊朗的互联网来个大规模的漏洞扫描,这种事情任何黑客白客都会干,俺也常干(俺是白客)。扫描结果将会显示该国哪几个安全漏洞最普遍。然后根据那些该国最普遍的安全漏洞,把Stuxnet略加修改,使其专门针对那些漏洞来传播,这样其定向性大大加强。这解释了为什么全世界只有伊朗一国的Stuxnet感染率达到70%以上,而别的国家只有不到15%的感染率(注意:这个观点属于笔者本人,别偷啊)。
那这Stuxnet最后是如何传到伊朗纳坦兹(Natanz)的浓缩铀工厂里的呢?工厂的网络虽然不和外界连接,但数据交换还是要进行的,不然没法运行。怎么交换数据呢?最普遍的办法就是U盘(USB Drive)。StuxnetU盘克星!工厂里的俄国工程师把U盘插入一台感染上Stuxnet的计算机,下一次往控制台上一插,感染就玩成了。 Bingo!
那么,Stuxnet是怎样玩残伊朗的核工厂的呢?据称在近17个月的时间内,Stuxnet潜伏在目标系统特定的组件里,改变离心机旋转速度的控制,通过让离心机快速转动然后急剧停止来使离心机受损伤。虽然其没有直接破坏离心机,但它使轴承快速磨损,导致设备需要不断更新和维修。而由于联合国的经济制裁,这种设备不得进口,伊朗呼天不应,叫地不灵。
那么你会问:操作人员为什么没有及早发现这个问题呢?这个Stuxnet最狡猾之处,就是它在开始搞破环之前先把机器正常运转的一段数据录下来,然后只向操作人员显示正常的数据。哎呀呀,干这种欺上瞒下的事咱们中国的贪官最在行哈。
等到工厂的管理层发现前年和去年铀235的产量大大降低,而设备的损坏率大大升高,百思不求其解时,已经太晚了。
你会问:计算机中毒,干脆把那台计算机关掉不就行了吗?但假如所有的计算机都中毒你怎么办?把所有的计算机都关掉?那工厂不就完蛋了?你会说,那给计算机消毒就行了。可是核设施不可能把所有计算机都停下,然后消毒。那就一台一台,或一小批一小批去消毒不就行了?不行!消了毒的计算机一放回网络马上又被其它有毒计算机感染。你说打了补丁后怎么还会被感染呢?也不行!因为没有任何一个补丁可以有效地防止Stuxnet的再次感染。 Livian Ge 详述了Stuxnet的感染过程,见附录。Stuxnet的感染和重复感染能力,是多渠道,全方位的,防不胜防。你会说:计算机不都做了备份(backup)吗?只要用备份就可以修复计算机了嘛。问题是,要是这些备份也感染上了,怎么办?这些计算机是哪一天感染上Stuxnet的,没有谁知道。
就在伊朗纳坦兹工厂夜以继日加班加点为所有计算机消毒时,一件意想不到的事情发生了:该工厂两位负责这一消毒行动的IT专家在下班驾车回家的路上,一个骑摩托车的人往他们的车上各贴了一枚磁性炸弹。一人重伤终生残疾,另一人当场死亡。这对于伊朗纳坦兹工厂犹如雪上加霜。
现在,唯一可以彻底修复Stuxnet造成的破坏的,只有扔掉工厂里所有的计算机,进口和更换新的设备,一切从头来。这是唯一的办法。
美国和以色列的官员对 Stuxnet 三缄其口。但每次被问及此事的时候,以色列的官员就露出开心的笑容。奥巴马的大规模杀伤武器主智囊 Gary Samore 日前在一个关于伊朗的会议上并没有正面回复 Stuxnet,但他微笑着说:“我很高兴得知伊朗遇到了一些离心器的问题,美国和其盟友会尽一切能力来使这事更加麻烦点”。
三年前,以色列还是坚信只有用武力才能摧毁伊朗的核武器设施。但现在,Stuxnet 不费一枪一弹就实现了拖延时间的目地。
这件事起始于09 6 月,Stuxnet 蠕虫开始流传。但奇怪的是,这个病毒并不像其他病毒那样邪恶。德国汉堡的安全专家 Langner 发现,Stuxnet 只在一群有着特殊配置的西门子控制器的情况下才会启动。而这种配置,往往只出现在离心器上。比如,有段程序只会在 984 个机器连在一起的时候才会运行。
巧合的是,IAEA 2009 年底在Natanz 的调查中发现,伊朗取出了 984 台工作不正常的机器。
笔者撰写这篇文章时参考了至少36篇文献,笔者的计算机至少22次被Stuxnet蠕虫感染。但这个蠕虫对于笔者来说是绝对无害的。对于全世界各国(除伊朗之外),Stuxnet也是无害的。唯一可能有害的,就是它已经被解码了。今后要是有人改写这个超级蠕虫,让它去实现其它目的,比如说远程遥控核反应堆、超级水坝、摩天大楼的电梯、远洋巨轮、巨型客机,等等等等,那将是人类的噩梦。
但是,如果各单位都有笔者这样的专家,问题就比较乐观了(自吹自擂哈)。
以上就是M国如何不发一枪弹,玩残伊朗核武计划的秘密。请注意俺可没说Stuxnet是谁写的。
地球啊,早晚要完蛋!
写于2011年3月27日


http://blog.creaders.net/bxie1/user_blog_diary.php?did=82456
 
这个人,俺看过他的文章... 高来高去的, 不是一般的能人.
 
Possible origin
Both Israel and the United States or other Western nations, working separately or together, have been named as possible creators of Stuxnet.
[edit] Israel

Israel, perhaps through Unit 8200,<SUP class=reference id=cite_ref-80>[81]</SUP> has been speculated to be the country behind Stuxnet in many media reports<SUP class=reference id=cite_ref-guardian_49-2>[50]</SUP><SUP class=reference id=cite_ref-FP_81-0>[82]</SUP><SUP class=reference id=cite_ref-economist_60-1>[61]</SUP> and by experts such as Richard Falkenrath, former Senior Director for Policy and Plans within the U.S. Office of Homeland Security.<SUP class=reference id=cite_ref-Yahoo.21_82-0>[83]</SUP><SUP class=reference id=cite_ref-nyt_50-2>[51]</SUP> Yossi Melman, who covers intelligence for the Israeli daily newspaper Haaretz and is writing a book about Israeli intelligence, also suspected that Israel was involved, noting that Meir Dagan, the former (2011) head of the national intelligence agency Mossad, had his term extended in 2009 because he was said to be involved in important projects. Additionally, Israel now expects that Iran will have a nuclear weapon in 2014 or 2015—at least three years later than earlier estimates—without the need for an Israeli military attack on Iranian nuclear facilities; "They seem to know something, that they have more time than originally thought”, he added.<SUP class=reference id=cite_ref-NYTimes20100929_14-1>[15]</SUP><SUP class=reference id=cite_ref-broad20110115_26-3>[27]</SUP> Israel has not publicly commented on the Stuxnet attack but confirmed that cyberwarfare is now among the pillars of its defense doctrine, with a military intelligence unit set up to pursue both defensive and offensive options.<SUP class=reference id=cite_ref-83>[84]</SUP><SUP class=reference id=cite_ref-84>[85]</SUP> When questioned whether Israel was behind the virus in the fall of 2010, some Israeli officials broke into "wide smiles", fueling speculation that the government of Israel was involved with its genesis.<SUP class=reference id=cite_ref-nyt-19stuxnet_85-0>[86]</SUP> American presidential advisor Gary Samore also smiled when Stuxnet was mentioned,<SUP class=reference id=cite_ref-broad20110115_26-4>[27]</SUP> although American officials have indicated that the virus originated abroad.<SUP class=reference id=cite_ref-nyt-19stuxnet_85-1>[86]</SUP> According to The Telegraph, Israeli newspaper Haaretz reported that a video celebrating operational successes of Gabi Ashkenazi, retiring IDF Chief of Staff, was shown at his retirement party and included references to Stuxnet, thus strengthening claims that Israel's security forces were responsible. <SUP class=reference id=cite_ref-WilliamsCTelegraph_86-0>[87]</SUP>
In 2009, a year before Stuxnet was discovered, Scott Borg of the United States Cyber-Consequences Unit (US-CCU) suggested that Israel might prefer to mount a cyber-attack rather than a military strike on Iran's nuclear facilities.<SUP class=reference id=cite_ref-87>[88]</SUP> According to Borg this kind of attack could involve disrupting sensitive equipment such as centrifuges using malware introduced via infected memory sticks: "Since the autumn of 2002, I have regularly predicted that this sort of cyber-attack tool would eventually be developed ... Israel certainly has the ability to create Stuxnet and there is little downside to such an attack, because it would be virtually impossible to prove who did it. So a tool like Stuxnet is Israel's obvious weapon of choice."<SUP class=reference id=cite_ref-economist2_24-1>[25]</SUP> Iran uses P-1 centrifuges at Natanz, the design for which A. Q. Khan stole in 1976 and took to Pakistan. His black market nuclear-proliferation network sold P-1s to, among other customers, Iran. Experts believe that Israel also somehow acquired P-1s and tested Stuxnet on the centrifuges, installed at the Dimona facility that is part of its own nuclear program.<SUP class=reference id=cite_ref-broad20110115_26-5>[27]</SUP> The equipment may be from the United States, which received P-1s from Libya's former nuclear program.<SUP class=reference id=cite_ref-88>[89]</SUP><SUP class=reference id=cite_ref-broad20110115_26-6>[27]</SUP>
Some have also referred to several clues in the code such as a concealed reference to the word "MYRTUS", believed to refer to the Myrtle tree, or Hadassah in Hebrew. Hadassah was the birth name of the former Jewish queen of Persia, Queen Esther.<SUP class=reference id=cite_ref-MES_89-0>[90]</SUP><SUP class=reference id=cite_ref-90>[91]</SUP> However, it may be that the "MYRTUS" reference is simply a misinterpreted reference to SCADA components known as RTUs (Remote Terminal Units) and that this reference is actually "My RTUs"–a management feature of SCADA.<SUP class=reference id=cite_ref-scada_rtus_91-0>[92]</SUP> Also, the number 19790509 appears once in the code and might refer to the date "1979 May 09", the day Habib Elghanian, a Persian Jew, was executed in Tehran.<SUP class=reference id=cite_ref-symantec_dossier_30-5>[31]</SUP><SUP class=reference id=cite_ref-92>[93]</SUP><SUP class=reference id=cite_ref-93>[94]</SUP> Another date that appears in the code is "24 September 2007", the day that Iran's president Mahmoud Ahmadinejad spoke at Columbia University and made comments questioning the validity of the Holocaust.<SUP class=reference id=cite_ref-gross201104_20-11>[21]</SUP> Such data is not conclusive, since, as written by Symantec, "Attackers would have the natural desire to implicate another party" with a false flag.<SUP class=reference id=cite_ref-gross201104_20-12>[21]</SUP><SUP class=reference id=cite_ref-symantec_dossier_30-6>[31]</SUP>
[edit] United States

There has also been speculation on the involvement of the United States,<SUP class=reference id=cite_ref-us_94-0>[95]</SUP> with one report stating that "there is vanishingly little doubt that [it] played a role in creating the worm."<SUP class=reference id=cite_ref-gross201104_20-13>[21]</SUP> It has been reported that the United States, under one of its most secret programs, initiated by the Bush administration and accelerated by the Obama administration, has sought to destroy Iran's nuclear program by novel methods such as undermining Iranian computer systems. A diplomatic cable obtained by WikiLeaks showed how the United States was advised to target Iran's nuclear capabilities through 'covert sabotage'.<SUP class=reference id=cite_ref-95>[96]</SUP> A Wired article claimed that Stuxnet "is believed to have been created by the United States".<SUP class=reference id=cite_ref-96>[97]</SUP> The CIA may have caused a large Siberian pipeline explosion in 1982 by sabotaging SCADA software the Soviets stole.<SUP class=reference id=cite_ref-gross201104_20-14>[21]</SUP>
[edit] Joint effort and other nations

According to Vanity Fair, Rieger stated that three European countries' intelligence agencies agreed that Stuxnet was a joint United States-Israel effort. The code for the Windows injector and the PLC payload differ in style, likely implying the participation of two nations. Other experts believe that a US-Israel cooperation is unlikely because "the level of trust between the two countries’ intelligence and military establishments is not high." Jordan and France are other possibilities, and Siemens may have also participated.<SUP class=reference id=cite_ref-gross201104_20-15>[21]</SUP><SUP class=reference id=cite_ref-us_94-1>[95]</SUP> Langner also speculated that the infection may have spread from USB drives belonging to Russian contractors.<SUP class=reference id=cite_ref-97>[98]</SUP> On 15 July 2010, the day the worm's existence became widely known, a distributed denial-of-service attack—almost certainly from Russia and likely related to Stuxnet—made on the servers for two leading mailing lists on industrial-systems security disabled one of the lists.<SUP class=reference id=cite_ref-gross201104_20-16>[21</SUP>
 
这个人,俺看过他的文章... 高来高去的, 不是一般的能人.

这个解滨比俞力工差远了。。不是一个段位的。。:(
 
这个解滨比俞力工差远了。。不是一个段位的。。:(
似乎听过名字。。。 你给引导一篇?:)
 
技术含量忒高了。晕。:rolleyes:
 
后退
顶部