Computers in Iran have been hardest hit by a dangerous computer worm that tries to steal information from industrial control systems.
ย
According to data compiled by Symantec Corp., nearly 60 percent of all systems infected by the worm are located in Iran. Indonesia and India have also been hard-hit by the malicious software, known as Stuxnet.
ย
Looking at the dates on digital signatures generated by the worm, the malicious software may have been in circulation since as long ago as January, said Elias Levy, senior technical director with Symantec Security Response.
ย
More from IDG News Service
Siemens: Removing SCADA worm may harm plants
ย
ย
Stuxnet was discovered last month by VirusBlokAda, a Belarus-based antivirus company that said it found the software on a system belonging to an Iranian customer. The worm seeks out Siemens SCADA (supervisory control and data acquisition) management systems, used in large manufacturing and utility plants, and tries to upload industrial secrets to the Internet.
ย
ย
Symantec isnโt sure why Iran and the other countries are reporting so many infections. โThe most we can say is whoever developed these particular threats was targeting companies in those geographic areas,โ Levy said.
ย
The U.S. has a long-running trade embargo against Iran. โAlthough Iran is probably one of the countries that has the worst infections of this, they are also probably a place where they donโt have much AV right now,โ Levy said.
ย
Siemens wouldnโt say how many customers it has in Iran, but the company now says that two German companies have been infected by the virus. A free virus scanner posted by Siemens earlier this week has been downloaded 1,500 times, a company spokesman said.
ย
Earlier this year, Siemens said it planned to wind down its Iranian business โ a 290-employee unit that netted 438 million Euros in 2008, according to the Wall Street Journal. Critics say the companyโs trade there has helped feed Iranโs nuclear development effort.
ย
Symantec compiled its data by working with the industry and redirecting traffic aimed at the wormโs command and control servers to its own computers. Over a three-day period this week, computers located at 14,000 IP addresses tried to connect with the command and control servers, indicating that a very small number of PCs worldwide have been hit by the worm. The actual number of infected machines is probably in the 15,000 to 20,000 range, because many companies place several systems behind one IP address, according to Symantecโs Levy.
ย
Because Symantec can see the IP address used by machines that try to connect with the command and control servers, it can tell which companies have been infected. โNot surprisingly, infected machines include a variety of organizations that would use SCADA software and systems, which is clearly the target of the attackers,โ the company said in its blog post Thursday.
ย
Stuxnet spreads via USB devices. When an infected USB stick is viewed on a Windows machine, the code looks for a Siemens system and copies itself to any other USB devices it can find.
ย
A temporary workaround for the Windows bug that allows Stuxnet to spread can be found here.
ย
ย
ย
Robert McMillan covers computer security and general technology breaking news for The IDG News Service. Follow Robert on Twitter at @bobmcmillan. Robertโs e-mail address is [emailย protected]