Computers can go wrong and everyone is used to it. But that's at home.
We assume that the machines controlling the infrastructure that makes everything tick - power stations, chemical works, water purification plants - have rock-solid defences in place to deal with unexplained crashes or virus attacks.
Now, though, a new kind of online sabotage has reached its zenith with a self-replicating "worm" that started on a single USB drive and has spread rapidly through industrial computer systems around the world.
So sophisticated that many analysts believe it can only be part of a state-sponsored attack, the Stuxnet worm - or "malware" - is the first such programming creation designed with the specific intention of causing real world damage.
And if the experts are right, it could herald a new chapter in the history of cyber warfare.
The worm, designed to spy on and subsequently reprogramme industrial systems running a specific piece of industrial control software produced by German company Siemens, has now been detected on computers in Indonesia, India and Pakistan, but more significantly Iran; 60 per cent of current infections have taken place within the country, with some 30,000 internet-connected computers affected so far, including machines at the nuclear power plant in Bushehr, due to open in the next few weeks.
Hamid Alipour, deputy head of Iran's Information Technology Company, warned that nearly four months after it was identified, "new versions of the virus are spreading".
And he claimed that the hackers responsible must have been the result of "huge investment" by a group of hostile nations.
Despite intense scrutiny of the code, malware experts have so far been unable to discover exactly what the intended target of Stuxnet may be, or has been. But Alan Bentley, international vice president at security firm Lumension, is in no doubt that it is "the most refined piece of malware ever discovered".
The motive is certainly not, as is usual with such attacks, financial gain or simple tomfoolery; Stuxnet is intelligent enough to target specific kinds of industrial computer systems configured in a certain way and then, if it finds what it's looking for, seek new orders to disrupt them.
Two potential targets of the worm may have been nuclear facilities within Iran at Bushehr and Natanz; indeed, a document on the website Wikileaks suggests that a nuclear accident may have occurred at Natanz during early July last year, followed shortly afterwards by the unexplained resignation of the head of Iran's Atomic Energy Organisation.
But if that was Stuxnet's intended target, it has continued to spread regardless, causing consternation at industrial facilities worldwide. Melissa Hathaway, a former United States national cybersecurity co-ordinator, has expressed particular concern at the availability of Stuxnet's code and the techniques it employs to the wider internet community, saying: "We have about 90 days to fix this before some hacker begins using it."
Security software firm Symantec has estimated that Stuxnet would have taken between five and 10 specialists about six months to compile - a resource not within the means of the average internet criminal.
One of the engineers working on unpicking the code expressed his surprise at the sophistication of the project, and said: "This is what nation states build if their only other option would be to go to war."
Iran's deeply controversial nuclear ambitions throw up any number of likely suspects but a number of fingers have pointed at Israel, and in particular its intelligence corps, Unit 8200.
Last year, Reuters reported on Israel's burgeoning cyber-warfare project, with a recently retired Israeli security cabinet member stating that Iran's computer networks were vulnerable.
Scott Borg, director of the US Cyber Consequences Unit, added that "a contaminated USB stick would be enough" to commandeer the controls of sensitive sites such as uranium enrichment plants - a rather prescient prediction.
The ramifications of this incident are considerable. Not only are there worries about the effects of Stuxnet upon computers that are critical to people's everyday lives but there's also great concern over the poor level of computer security being employed by those operating such machines.
Stuxnet made its way into computer systems via vulnerabilities in Microsoft's Windows operating system, before taking control of the Siemens software via its default password.
That something as mundane as a password issue could have such a critical effect has also caused consternation amongst commentators and analysts - as has the unnerving announcement from Siemens to its customers not to change that password lest it "impact plant operations".
Siemens has offered a free download on its website to remove Stuxnet; while this is a common procedure for many viruses, it is alarming that a nuclear facility would have to do such a thing to ensure its stability.
Stuxnet has kicked off an additional debate over exactly how prevalent this kind of cyber-attack may already be. Russian websites were attacked during the South Ossetia war in 2008. In 2007, the US suffered a vast data theft in what one senior official dubbed "an espionage Pearl Harbour". And when Israel attacked a suspected Syrian reactor in the same year, it may have used an "off switch" buried in the Syrian radar system to allow its aircraft to travel undetected.
And yet not every aspect of these attacks goes smoothly. For all the sophistication of the Stuxnet worm, one school of thought suggests that something actually went wrong; after setting itself a particular task, it has spread accidentally to thousands of machines it never intended to attack, thus bringing it to wider attention and opening eyes to the possibility that this kind of activity may have been going on undetected for some time.
Iran's official IRNA news agency reports that only personal machines have been affected at the Bushehr plant, with the main operating system unaffected. It is nonetheless safe to say that the new potential for industrial sabotage could soon make an old-fashioned error message seem like small fry indeed.
- INDEPENDENT
Worm that turned breaks new ground
AdvertisementAdvertise with NZME.