Stuxnet — Operation Olympic Games

2010-06

The joint US-Israeli cyber-sabotage operation that physically damaged Iranian uranium-enrichment centrifuges at Natanz between 2007 and 2010.

Background

Iran's nuclear programme — pursued at the Natanz Fuel Enrichment Plant under International Atomic Energy Agency safeguards — had been the subject of sustained Western and Israeli concern across the 2000s. By 2006, the IAEA had reported Iran's failure to declare aspects of its enrichment programme; the UN Security Council had imposed successive sanctions; and the prospect of an Israeli or US military strike against Iranian nuclear facilities had become a recurring element of regional policy debate.1

The Bush Administration, in this context, sought a non-kinetic option that could materially slow the Iranian enrichment programme without producing the regional consequences of a military strike. According to subsequent on-record interviews by US officials with the New York Times' David Sanger, the resulting programme — codenamed Operation Olympic Games — was authorised by President Bush in approximately 2006 and continued under President Obama, who substantially expanded its scope. The programme was developed jointly by the United States National Security Agency, the Central Intelligence Agency, and Israel's signals-intelligence Unit 8200 of the Aman directorate, with operational support from Mossad.2

The operational target was the Natanz cascade halls — the underground facility at which Iran operated thousands of IR-1 centrifuges in a cascade configuration to enrich uranium hexafluoride. The technical objective was to produce centrifuge failures at a rate slightly above the natural failure rate, in a pattern that would be difficult for Iranian engineers to attribute to deliberate sabotage rather than to mechanical or material defects in the centrifuges themselves.3

The Operation

The worm now publicly known as Stuxnet was a Microsoft Windows malware payload of unprecedented sophistication, weighing approximately 500 kilobytes and exploiting four previously unknown ("zero-day") Windows vulnerabilities — the first time any malware had been observed using more than one zero-day. It propagated through removable USB drives, network shares, and printer-spooler vulnerabilities, but was specifically designed to take action only when it found a target system running Siemens Step7 industrial control software, attached to programmable logic controllers (PLCs) of specific Siemens models, and configured with parameters that matched a centrifuge cascade — a level of target specificity unprecedented in publicly documented malware.4

When Stuxnet identified its target environment, it modified the PLC code to vary centrifuge rotor frequencies in patterns designed to produce centrifuge mechanical failure: spinning the rotors above the safe upper-bound frequency, then dropping them below safe lower bounds, in cycles intended to fatigue the rotor materials. While the malicious operations were running, Stuxnet simultaneously fed false sensor readings to the operator monitoring stations — meaning that Iranian engineers observing their consoles would see normal operating parameters even as centrifuges in the underground halls were being driven to destruction.5

The operation crossed the Natanz air gap — the deliberate disconnection of the facility's industrial control systems from the public internet — through, in published accounts, a combination of supply-chain compromise of Iranian centrifuge-related companies and the inadvertent introduction of Stuxnet on USB drives by individuals working at the facility. The worm subsequently propagated across the air gap, identified its target, and produced damage to a substantial fraction of the Natanz centrifuge cascade across approximately the period 2008–2010. Published estimates of the proportion of Natanz centrifuges damaged have ranged from approximately 10% to over 30%.6

Disclosure

Stuxnet's existence became publicly known in June 2010, when the Belarussian information-security firm VirusBlokAda detected unusual malware on systems belonging to an Iranian customer. The Belarussian researchers initially identified the malware's certificate-spoofing technique. Subsequent analysis by Symantec, Kaspersky Lab, and successive private-sector firms produced the public technical understanding of the worm. The most extensive public technical analysis was Ralph Langner's identification of the Siemens Step7 / PLC targeting pattern as specifically matching a centrifuge-cascade configuration.7

The first substantive on-record US Government acknowledgment came in David Sanger's June 2012 New York Times article "Obama Order Sped Up Wave of Cyberattacks Against Iran," published as an excerpt from his book Confront and Conceal, drawing on US official interviews. The article identified the operation by its codename Olympic Games and provided substantial operational detail. The Israeli role was acknowledged in successive Israeli press accounts, including reporting in Haaretz, Yedioth Ahronoth, and the Times of Israel.8

Subsequent US Department of Justice proceedings — including the prosecution of retired Marine Corps General James Cartwright in October 2016 for false statements to investigators in connection with disclosures relating to Stuxnet — produced limited additional public-record material. President Obama pardoned Cartwright in his final days in office.9

Legacy

Stuxnet has been characterised in essentially all subsequent academic and policy literature as the first publicly documented use of a cyber weapon to produce physical-world destruction. The operation established three things that have shaped subsequent cyber-policy and cyber-conflict debate. First, that air gaps could be crossed by patient and well-resourced state actors. Second, that industrial control systems — not just IT systems — were viable cyber-attack targets, with implications for critical infrastructure across power, water, transportation, and other sectors. Third, that cyber operations could produce kinetic effects equivalent to military operations, raising substantial questions of international humanitarian law and the law of armed conflict.10

For the US-Iranian relationship, the disclosure of Olympic Games has been characterised by Iranian officials as the precipitating event for substantial Iranian investment in offensive cyber capability. Iranian-attributed cyber operations against US targets — including the 2012 Saudi Aramco Shamoon attack, the 2012 distributed-denial-of-service attacks on US banks, and successive operations across the post-2015 period — have been characterised by US officials as part of the cycle initiated by Olympic Games.11

The operation also produced substantial Western policy reflection on the consequences of using cyber weapons. Stuxnet's accidental escape from Natanz — its propagation to systems outside its intended target environment, where its code became available for analysis by security researchers, malware authors, and rival state services — has been characterised in subsequent literature as a paradigmatic example of the difficulty of containing cyber operations. The post-Stuxnet emergence of further industrial-control-system-targeting malware (Industroyer / CrashOverride against Ukrainian electric infrastructure, Triton against Saudi petrochemical facilities, and successive) has been attributed in part to the analytical understanding made possible by Stuxnet's exposure.12

This operation is documented in detail on the agency pages of the National Security Agency (Operation Olympic Games), the Central Intelligence Agency, and the Military Intelligence Directorate (Aman) (which housed Unit 8200, the Israeli signals-intelligence component). Mossad operational support is referenced on the Mossad page. The country-level context is on the pages for Israel and the United States; the operational target context is relevant to Iran.

Sources & Further Reading

  1. International Atomic Energy Agency, Implementation of the NPT Safeguards Agreement in the Islamic Republic of Iran, successive Director-General reports, 2003–present.
  2. David E. Sanger, "Obama Order Sped Up Wave of Cyberattacks Against Iran," New York Times, 1 June 2012; David E. Sanger, Confront and Conceal: Obama's Secret Wars and Surprising Use of American Power (Crown, 2012).
  3. Ralph Langner, "To Kill a Centrifuge: A Technical Analysis of What Stuxnet's Creators Tried to Achieve," The Langner Group, November 2013.
  4. Nicolas Falliere, Liam O Murchu, and Eric Chien, W32.Stuxnet Dossier, Symantec, version 1.4, February 2011; Kim Zetter, Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon (Crown, 2014).
  5. Langner, "To Kill a Centrifuge"; Falliere et al., W32.Stuxnet Dossier.
  6. Sanger, Confront and Conceal; Institute for Science and International Security, Did Stuxnet Take Out 1,000 Centrifuges at the Natanz Enrichment Plant?, 22 December 2010.
  7. VirusBlokAda technical bulletins, June 2010; Falliere, O Murchu, and Chien, W32.Stuxnet Dossier; Ralph Langner, "Stuxnet Logbook" series of technical posts, 2010–2013.
  8. Sanger, "Obama Order Sped Up Wave of Cyberattacks Against Iran," op. cit.; subsequent Israeli press reporting.
  9. United States v. James E. Cartwright, plea agreement, D.D.C., 17 October 2016; Presidential pardon issued by President Barack Obama, 17 January 2017.
  10. P. W. Singer and Allan Friedman, Cybersecurity and Cyberwar: What Everyone Needs to Know (Oxford UP, 2014); Andy Greenberg, Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers (Doubleday, 2019).
  11. ODNI Annual Threat Assessments, successive editions; David E. Sanger, The Perfect Weapon (Crown, 2018).
  12. Greenberg, Sandworm; ESET, "Industroyer: Biggest Threat to Industrial Control Systems Since Stuxnet," 12 June 2017; FireEye, "Attackers Deploy New ICS Attack Framework 'TRITON' and Cause Operational Disruption to Critical Infrastructure," 14 December 2017.