Operation “Olympic Games” Securing Memory Sharing
Total Page:16
File Type:pdf, Size:1020Kb
OPERATION “OLYMPIC GAMES” SECURING MEMORY SHARING FOR CLOUD TENANTS Kshitij Yadav Associate Sales Engineer Analyst Dell EMC [email protected] Abhiram T.S. Associate Sales Engineer Analyst Dell EMC [email protected] Knowledge Sharing Article © 2020 Dell Inc. or its subsidiaries. The Dell Technologies Proven Professional Certification program validates a wide range of skills and competencies across multiple technologies and products. From Associate, entry-level courses to Expert-level, experience-based exams, all professionals in or looking to begin a career in IT benefit from industry-leading training and certification paths from one of the world’s most trusted technology partners. Proven Professional certifications include: • Cloud • Converged/Hyperconverged Infrastructure • Data Protection • Data Science • Networking • Security • Servers • Storage • Enterprise Architect Courses are offered to meet different learning styles and schedules, including self-paced On Demand, remote-based Virtual Instructor-Led and in-person Classrooms. Whether you are an experienced IT professional or just getting started, Dell Technologies Proven Professional certifications are designed to clearly signal proficiency to colleagues and employers. Learn more at www.dell.com/certification 2020 Dell Technologies Proven Professional Knowledge Sharing 2 Table of Contents Introduction .................................................................................................................................................. 4 Stuxnet ...................................................................................................................................................... 4 Computer Worm ....................................................................................................................................... 4 Payload ...................................................................................................................................................... 4 Zombie ...................................................................................................................................................... 4 Initial Plot ...................................................................................................................................................... 5 What It Targeted ....................................................................................................................................... 6 Who Identified It ....................................................................................................................................... 7 The Acual Working ........................................................................................................................................ 7 Step 7 software infection .......................................................................................................................... 8 PLC infection ............................................................................................................................................. 9 Countries It Effected ................................................................................................................................... 10 Stuxnet effect on Iran ............................................................................................................................. 11 Purpose of Stuxnet .................................................................................................................................. 12 Stuxnet Source Code ............................................................................................................................... 12 The Reactions .............................................................................................................................................. 13 Iran .......................................................................................................................................................... 13 Israel ........................................................................................................................................................ 14 USA .......................................................................................................................................................... 16 Legacy of Stuxnet ........................................................................................................................................ 17 Precautions Over Stuxnet Types ................................................................................................................. 17 McAfee Recommendations ..................................................................................................................... 17 Symantec Endpoint Protection – Application and Device Control ......................................................... 18 Conclusion ................................................................................................................................................... 18 References .................................................................................................................................................. 20 Disclaimer: The views, processes or methodologies published in this article are those of the authors. They do not necessarily reflect Dell Technologies’ views, processes or methodologies. Dell.com/certification 3 Introduction Stuxnet Stuxnet is a malevolent PC worm, first revealed in 2010, though thought to have been being developed in 2005. Stuxnet targets supervisory control and data acquisition (SCADA) frameworks and is suspected liable for greatly harming the atomic program of Iran. While neither country has straightforwardly assumed responsibility, the worm is widely considered a cyberweapon constructed together by the United States and Israel. Before we get into Stuxnet let us see what precisely a PC worm is. Computer Worm Albeit neither one of the countries has straightforwardly conceded duty, the worm is generally comprehended to be a cyberweapon constructed together by the United States and Israel. Presently, before we get into Stuxnet let us see what precisely a "payload" is. Payload Normal malignant payloads may erase records on a host framework, scramble records in a ransomware assault, or exfiltrate information, for example, classified reports or passwords. The payload is the piece of transmitted information that is the real expected message. Headers and metadata are sent distinctly to empower payload conveyance. With regard to a PC infection or worm, the payload is the segment of the malware which performs vindictive activity. The term is acquired from transportation, where payload alludes to the piece of the heap that pays for transportation. The payload is the piece of the private client content which could likewise contain malware, for example, worms or infections which plays out the vindictive activity; erasing information, sending spam or scrambling information. Notwithstanding the payload, such malware additionally regularly has overhead code focused on essentially spreading itself or maintaining a strategic distance from identification. Worms spread by abusing vulnerabilities in working frameworks. Merchants with security issues supply standard security refreshes, and on the off chance that these are introduced to a machine, at that point most worms can't spread to it. In the event that a powerlessness is uncovered before the security fix discharged by the seller, a zero-day assault is conceivable. Presumably the most well-known payload for worms is to introduce an indirect access. This permits the PC to be remotely constrained by the worm creator as a "zombie". Systems of such machines are frequently alluded to as botnets and are generally utilized for a scope of vindictive purposes, including sending spam or performing Denial of Service (DoS) assaults. Zombie A zombie is a PC associated with the Internet that has been undermined by a programmer, PC infection or trojan steed program and can be utilized to perform malignant undertakings of some 2020 Dell Technologies Proven Professional Knowledge Sharing 4 sort under remote course. Botnets of zombie PCs are regularly used to spread email spam and dispatch disavowal of-administration assaults (DoS assaults). Most proprietors of "zombie" PCs are uninformed that their framework is being utilized right now. Since the proprietor will in general be uninformed, these PCs are figuratively contrasted with anecdotal zombies. An organized Distributed Denial of Service (DDoS) assault by various botnet machines additionally looks like a "zombie swarm assault", as often seen in anecdotal zombie films. Zombies can be used to lead DDoS assaults, a term which alludes to the organized flooding of target sites by huge quantities of PCs without a moment's delay. The enormous number of Internet clients making concurrent solicitations of a site's server is expected to bring about smashing and counteraction of real clients from getting to the webpage. A variation of this kind of flooding is known as circulated debasement of-administration. Submitted by "beating" zombies, appropriated corruption of-administration is the directed and periodical flooding of sites expected to back off as opposed to crash an injured individual site. The viability of this strategy springs from the way that serious flooding can be immediately distinguished and helped, yet beating zombie assaults and the subsequent