Brian

14%
Flag icon
As for securing the payload better, there may have been limitations that prevented them from using more sophisticated techniques, such as encrypting it with a key derived from extensive and precise configuration data on the targeted machines so that only those machines could unlock it.
Brian
When I first read in this book about the encryption layers, I thought/assumes that it would use data/confit from the target configuration as the encryption key as well. Maybe they feared they didn’t know the target systems accurately enough to depend on that (and maybe why they wanted the config data sent to the c&c servers?), but the footnote points out that a later version of stuxnet DID use config data as the key and thus hasn’t been decrypted (openly at least).
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
Rate this book
Clear rating
Open Preview