Stuxnet: Perbedaan antara revisi

Konten dihapus Konten ditambahkan
BayuAH (bicara | kontrib)
k stuxnet
 
BayuAH (bicara | kontrib)
k sunting kecil#1
Baris 9:
 
Cacing ini awalnya menyebar secara membabi buta, namun memuat muatan [[perangkat perusak]] yang sangat khusus yang dirancang hanya mengincar sistem Kontrol Pengawas Dan Akuisisi Data Siemens ([[SCADA]], ''Siemens Supervisory Control And Data Acquisition'') yang diatur untuk mengendalikan dan memantau proses industri tertentu. Stuxnet menginfeksi PLC dengan mengubah aplikasi perangkat lunak [[WinCC|Step-7]] yang digunakan untuk memprogram ulang perangkat tersebut.
 
Varian yang berbeda dari Stuxnet miliki target lima organisasi [[Iran]]<ref>{{cite news
| url=http://www.bbc.co.uk/news/technology-12465688
| title=Stuxnet Virus Targets and Spread Revealed
| date=15 February 2011
| accessdate=17 February 2011
| publisher=[[BBC News]]
}}</ref>, kemungkinan target luas diduga adalah [[infrastruktur]] pengayaan [[uranium]] di Iran<ref name=BBC>{{Cite news|url=http://www.bbc.co.uk/news/technology-11388018|title=Stuxnet worm 'targeted high-value Iranian assets'|publisher=[[BBC News]]|date=23 September 2010|accessdate=23 September 2010|last=Fildes|first=Jonathan}}</ref><ref>{{cite news|url=http://www.telegraph.co.uk/technology/news/8021102/Stuxnet-virus-worm-could-be-aimed-at-high-profile-Iranian-targets.html |title=Stuxnet virus: worm 'could be aimed at high-profile Iranian targets' |publisher=The Daily Telegraph |date=23 September 2010 |accessdate=28 September 2010 |location=London |first=Claudine |last=Beaumont}}</ref>. Symantec mencatat pada [[Agustus]] [[2010]] bahwa 60% dari komputer yang terinfeksi di seluruh dunia berada di Iran<ref>{{cite news| url=http://www.reuters.com/article/idUSLDE68N1OI20100924 | work=Reuters | first=William | last=MacLean|title=UPDATE 2-Cyber attack appears to target Iran-tech firms | date=24 September 2010}}</ref>. Siemens menyatakan pada [[29 November]] cacing tidak menyebabkan kerusakan pada [[pelanggan]]<ref>{{cite web |url=http://www.computerworld.com/s/article/9185419/Siemens_Stuxnet_worm_hit_industrial_systems?taxonomyId=142&pageNumber=1|title=Siemens: Stuxnet worm hit industrial systems|author=ComputerWorld|date=September 14, 2010|work=|publisher=Computerworld|accessdate=3 October 2010}}</ref>, kecuali [[program nuklir Iran]], yang menggunakan peralatan [[Embargo|terembargo]] Siemens yang diperoleh secara rahasia, telah mengalami kerusakan karena Stuxnet<ref>{{cite news| url=http://www.cbsnews.com/stories/2010/11/29/world/main7100197.shtml | work=CBS News | title=Iran Confirms Stuxnet Worm Halted Centrifuges | date=29 November 2010}}</ref><ref name="NYTimes20100929">{{cite web|url=http://www.nytimes.com/2010/09/30/world/middleeast/30worm.html?_r=2&pagewanted=2&hpw|title=In a Computer Worm, a Possible Biblical Clue|autor=Ethan Bronner & William J. Broad |date=29 September 2010|publisher=[[NYTimes]]|lang=en|accessdate=2 October 2010}}</ref><ref name=rsilverstein20100925>{{cite web|url=http://www.richardsilverstein.com/tikun_olam/2010/09/25/iran-confirms-stuxnet-damage-to-nuclear-facilities/ |title=Iran Confirms Stuxnet Damage to Nuclear Facilities |publisher=[[Tikun Olam (blog)|Tikun Olam]] |date=25 September 2010 |accessdate=28 September 2010}}</ref><ref>{{cite news
| url=http://economictimes.indiatimes.com/news/news-by-industry/et-cetera/Software-smart-bomb-fired-at-Iranian-nuclear-plant-Experts/articleshow/6617686.cms
| title=Software smart bomb fired at Iranian nuclear plant: Experts
| publisher=Economictimes.indiatimes.com
| date=24 September 2010
| accessdate=28 September 2010
}}</ref>. Perusahaan keamanan komputer [[Rusia]] [[Kaspersky Lab]] menyimpulkan bahwa serangan canggih tersebut bisa dilakukan "dengan dukungan [[negara]]" dan telah diduga bahwa [[Israel]] dan [[Amerika Serikat]] mungkin telah terlibat<ref>Markoff, John, "[http://www.nytimes.com/2011/02/13/science/13stuxnet.html?scp=1&sq=Malware%20Aimed%20At%20Iran%20Hit%20Five%20Sites,%20Report%20Says&st=cse Malware Aimed at Iran Hit Five Sites, Report Says]", ''[[New York Times]]'', 13 February 2011, p. 15.</ref>.
 
==Referensi==