Siemens: Stuxnet infected 14 industrial plants

Siemens: Stuxnet infected 14 industrial plants

Summary: The malware, which targets software used by critical infrastructure companies, has infected industrial systems in Germany, but the UK appears to have escaped

SHARE:
TOPICS: Security
1

Stuxnet, a complicated piece of malware spread via USB, has infected 14 Siemens industrial systems around the world, according to the engineering technology company.

Stuxnet malware attacks supervisory control and data acquisition (Scada) systems that use Siemens WinCC Scada software. The Siemens software is used by a range of critical infrastructure providers, such as utilities companies.

The 14 infected locations were mostly processing plants, and critical infrastructure organisations had not been affected, Siemens spokesman Wieland Simon told ZDNet UK on Thursday.

"In no case did we note any damage," said Simon. "No critical infrastructure or production industry was infected."

Most of the infected plants are in Germany, and no cases have been reported in the UK, he added.

On Wednesday, Microsoft published a patch for the Stuxnet malware, which combines the characteristics of a rootkit, a worm and a Trojan. Siemens is advising its customers to implement the fix as soon as possible.

Globally, Stuxnet has infected between 90,000 and 100,000 systems, according to Symantec. Liam O'Murchu, a Symantec researcher, is scheduled to present a study of the malware at the Virus Bulletin VB2010 conference in Vancouver at the end of September, technology publication Computerworld UK noted on Thursday.

The malware has code which allows a hacker to control industrial systems, and it hides using a number of rootkits. It spreads via USB sticks using a vulnerability in Microsoft Windows.

"Any threat that is capable of taking control of a real-life physical system is worthy of a closer look," O'Murchu said in a submission to VB2010.

Topic: Security

Tom Espiner

About Tom Espiner

Tom is a technology reporter for ZDNet.com. He covers the security beat, writing about everything from hacking and cybercrime to threats and mitigation. He also focuses on open source and emerging technologies, all the while trying to cut through greenwash.

Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.

Talkback

1 comment
Log in or register to join the discussion
  • And we have a spammer:lizhiyong

    Please get rid of it.
    hkommedal