'''Stuxnet''' merupakan [[cacing komputer]] (worm) yang diketahui keberadaannya di bulan [[Juli]] [[2010]]. [[Perangkat perusak]] ini memiliki sasaran [[peranti lunak]] [[Siemens]] dan perangkat yang berjalan dalam sistem operasi [[Microsoft Windows]].<ref>{{cite web|url=http://www.msnbc.msn.com/id/41097319/ns/us_news-the_new_york_times|publisher=msnbc.com|title=Israel tests on worm called crucial in Iran nuclear delay}}</ref>. Ini bukan pertama kalinya [[Hacker|cracker]] menargetkan sistem [[industri]].<ref name="Siemans-Cyber">{{cite web|url=http://www.totallyintegratedautomation.com/2010/09/building-a-cyber-secure-plant/|publisher=Siemens|title=Building a Cyber Secure Plant|accessdate=5 December 2010 | date=30 September 2010|archive-date=2021-04-21|archive-url=https://web.archive.org/web/20210421092726/https://www.totallyintegratedautomation.com/2010/09/building-a-cyber-secure-plant/|dead-url=yes}}</ref>. Namun, ini adalah perangkat perusak pertama yang ditemukan mengintai dan mengganggu sistem industri,<ref name=compworld>{{Cite web
| url=http://www.computerworld.com/s/article/print/9185419/Siemens_Stuxnet_worm_hit_industrial_systems?taxonomyName=Network+Security&taxonomyId=142
| author=Robert McMillan
| accessdate=16 September 2010
| title=Siemens: Stuxnet worm hit industrial systems
| archive-date=2012-05-25
}}</ref>, dan yang pertama menyertakan [[rootkit]] ''[[Programmable logic controller|programmable logic controller (PLC)]]'' <ref>{{cite web|url=http://www.virusbtn.com/conference/vb2010/abstracts/LastMinute7.xml|title=Last-minute paper: An indepth look into Stuxnet|publisher=Virus Bulletin}}</ref><ref>{{cite news|url=http://www.bbc.co.uk/news/world-middle-east-11414483|title=Stuxnet worm hits Iran nuclear plant staff computers|publisher=BBC News | date=26 September 2010}}</ref>. ▼
| archive-url=https://archive.today/20120525053210/http://www.computerworld.com/s/article/print/9185419/Siemens_Stuxnet_worm_hit_industrial_systems?taxonomyName=Network+Security&taxonomyId=142
| dead-url=yes
▲ }}</ref> , dan yang pertama menyertakan [[rootkit]] ''[[Programmable logic controller|programmable logic controller (PLC)]]'' .<ref>{{cite web|url=http://www.virusbtn.com/conference/vb2010/abstracts/LastMinute7.xml|title=Last-minute paper: An indepth look into Stuxnet|publisher=Virus Bulletin}}</ref><ref>{{cite news|url=http://www.bbc.co.uk/news/world-middle-east-11414483|title=Stuxnet worm hits Iran nuclear plant staff computers|publisher=BBC News | date=26 September 2010}}</ref> .
Cacing ini awalnya menyebar secara membabi buta, namuntetapi memuat muatan [[perangkat perusak]] yang sangat khusus yang dirancang hanya mengincar sistem Kontrol Pengawas Dan Akuisisi Data Siemens ([[SCADA]], ''Siemens Supervisory Control And Data Acquisition'') yang diatur untuk mengendalikan dan memantau proses industri tertentu. Stuxnet menginfeksi PLC dengan mengubah aplikasi perangkat lunak [[WinCC|Step-7]] yang digunakan untuk memprogram ulang perangkat tersebut.
Varian yang berbeda dari Stuxnet miliki target lima organisasi [[Iran]],<ref>{{cite news
| url=http://www.bbc.co.uk/news/technology-12465688
| title=Stuxnet Virus Targets and Spread Revealed
| date=15 February 2011
| accessdate=17 February 2011
| publisher=[[BBC News]]
}}</ref>, kemungkinan target luas diduga adalah [[infrastruktur]] pengayaan [[uranium]] di Iran.<ref name=BBC>{{Cite news|url=http://www.bbc.co.uk/news/technology-11388018|title=Stuxnet worm 'targeted high-value Iranian assets'|publisher=[[BBC News]]|date=23 September 2010|accessdate=23 September 2010|last=Fildes|first=Jonathan}}</ref><ref>{{cite news|url=http://www.telegraph.co.uk/technology/news/8021102/Stuxnet-virus-worm-could-be-aimed-at-high-profile-Iranian-targets.html |title=Stuxnet virus: worm 'could be aimed at high-profile Iranian targets' |publisher=The Daily Telegraph |date=23 September 2010 |accessdate=28 September 2010 |location=London |first=Claudine |last=Beaumont}}</ref>. Symantec mencatat pada [[Agustus]] [[2010]] bahwa 60% dari komputer yang terinfeksi di seluruh dunia berada di Iran.<ref>{{cite news| url=http://www.reuters.com/article/idUSLDE68N1OI20100924 | work=Reuters | first=William | last=MacLean|title=UPDATE 2-Cyber attack appears to target Iran-tech firms | date=24 September 2010}}</ref>. Siemens menyatakan pada [[29 November]] cacing tidak menyebabkan kerusakan pada [[pelanggan]],<ref>{{cite web |url=http://www.computerworld.com/s/article/9185419/Siemens_Stuxnet_worm_hit_industrial_systems?taxonomyId=142&pageNumber=1|title=Siemens: Stuxnet worm hit industrial systems|author=ComputerWorld|date=September 14, 2010|work=|publisher=Computerworld|accessdate=3 October 2010}}</ref>, kecuali [[program nuklir Iran]], yang menggunakan peralatan [[Embargo|terembargo]] Siemens yang diperoleh secara rahasia, telah mengalami kerusakan karena Stuxnet.<ref>{{cite news| url=http://www.cbsnews.com/stories/2010/11/29/world/main7100197.shtml | work=CBS News | title=Iran Confirms Stuxnet Worm Halted Centrifuges | date=29 November 2010|access-date=2011-07-20|archive-date=2013-11-15|archive-url=https://web.archive.org/web/20131115005128/http://www.cbsnews.com/stories/2010/11/29/world/main7100197.shtml|dead-url=yes}}</ref><ref name="NYTimes20100929">{{cite web|url=http://www.nytimes.com/2010/09/30/world/middleeast/30worm.html?_r=2&pagewanted=2&hpw|title=In a Computer Worm, a Possible Biblical Clue |autorfirst1=Ethan |last1=Bronner &|authorlink1=Ethan Bronner |first2=William J. |last2=Broad |authorlink2=William Broad |date=29 September 2010|publisher=[[NYTimes]]|langlanguage=enEnglish|accessdate=2 October 2010}}</ref><ref name=rsilverstein20100925>{{cite web|url=http://www.richardsilverstein.com/tikun_olam/2010/09/25/iran-confirms-stuxnet-damage-to-nuclear-facilities/ |title=Iran Confirms Stuxnet Damage to Nuclear Facilities |publisher=[[Tikun Olam (blog)|Tikun Olam]] |date=25 September 2010 |accessdate=28 September 2010}}</ref><ref>{{cite news
| url=http://economictimes.indiatimes.com/news/news-by-industry/et-cetera/Software-smart-bomb-fired-at-Iranian-nuclear-plant-Experts/articleshow/6617686.cms
| title=Software smart bomb fired at Iranian nuclear plant: Experts
| publisher=Economictimes.indiatimes.com
| date=24 September 2010
| accessdate=28 September 2010
}}</ref>. Perusahaan keamanan komputer [[Rusia]] [[Kaspersky Lab]] menyimpulkan bahwa serangan canggih tersebut bisa dilakukan "dengan dukungan [[negara]]" dan telah diduga bahwa [[Israel]] dan [[Amerika Serikat]] mungkin telah terlibat.<ref>Markoff, John, "[http://www.nytimes.com/2011/02/13/science/13stuxnet.html?scp=1&sq=Malware%20Aimed%20At%20Iran%20Hit%20Five%20Sites,%20Report%20Says&st=cse Malware Aimed at Iran Hit Five Sites, Report Says]", ''[[New York Times]]'', 13 February 2011, p. 15.</ref>.
== Rujukan ==
{{commonscat}}
{{reflist}}
[[ar:ستوكسنت]]
[[bg:Стъкснет]]
[[cs:Stuxnet]]
[[de:Stuxnet]]
[[en:Stuxnet]]
[[es:Stuxnet]]
[[et:Stuxnet]]
[[fa:استاکسنت]]
[[fi:Stuxnet]]
[[fr:Stuxnet]]
[[he:סטוקסנט]]
[[hu:Stuxnet]]
[[it:Stuxnet]]
[[ja:スタックスネット]]
[[nl:Stuxnet]]
[[no:Stuxnet]]
[[pl:Stuxnet]]
[[pt:Stuxnet]]
[[ru:Stuxnet]]
[[sv:Stuxnet]]
[[uk:Стакснет]]
[[ur:سٹکسنیٹ]]
[[zh:震网]]
|