Stuxnet’s Finnish-Chinese Connection
I recently wrote a white paper entitled “Dragons, Tigers, Pearls, and Yellowcake” in which I proposed four alternative scenarios for the Stuxnet worm other than the commonly held assumption that it was Israel or the U.S. targeting Iran’s Bushehr or Natanz facilities. During the course of my research for that paper, I uncovered a connection between two of the key players in the Stuxnet drama: Vacon, the Finnish manufacturer of one of two frequency converter drives targeted by this malware; and RealTek, who’s digital certificate was stolen and used to smooth the way for the worm to be loaded onto a Windows host without raising any alarms. A third important piece of the puzzle, which I’ll discuss later in this article, directly connects a Chinese antivirus company which writes their own viruses with the Stuxnet worm.
Most people who have followed the Stuxnet investigation know that the international headquarters for Vacon is in Finland, but surprisingly, Finland isn’t where Vacon’s frequency converter drives are manufactured. Vacon’s manufacturing plant is actually located in the Peoples Republic of China (PRC) under the name Vacon Suzhou Drives Co. Ltd., located at 11A, Suchun Industrial Square 428# Xinglong Street, SIP Suzhou 215126 China.
Vacon isn’t the only company involved with Stuxnet that has a Chinese connection. The first genuine digital certificate used by Stuxnet developers was from RealTek Semiconductor Corp., a Taiwanese company which has a subsidiary in (of all places) Suzhou under the name Realsil Microelectronics, Inc. (450 Shenhu Road, Suzhou Industrial Park, Suzhou 215021 Jiangsu Province, China).
The question, of course, is what, if anything, does this say about China’s possible role as the source of the Stuxnet worm. There are scenarios under which China would benefit such as the rare-earths scenario that I presented in my white paper, however there’s a lack of data on mining failures that can be attributed to Stuxnet. The closest that anyone has come to identifying compromised operations is at Natanz however their centrifuge failures go back several years according to this February, 2010 report by ISIS, while the earliest Stuxnet sample seen by Symantec’s researchers was June, 2009 and that’s before it had signed driver files or exploited the remote code execution vulnerability that appeared in January, 2010 and March, 2010 respectively. Natanz may very well have been the target of an earlier cyber attack, or even multiple attacks, which had nothing to do with Stuxnet.
Does China Benefit By Attacking Natanz?
In 2008, China decided to assist the IAEA inspectors after it learned that Iran was in possession of blueprints to shape uranium metal into warheads, according to this article in The Telegraph. That same article discloses that Chinese designs for centrifuges were discovered in Iran, supplied via Pakistan’s AQ Khan.
On April 13, 2010, Beijing reiterated its opposition to Iran’s goal to develop nuclear weapons capabilities while stating that sanctions against Iran would be counter-productive. In other words, the PRC wanted to support its third largest supplier of oil (after Saudi Arabia and Angola) while at the same time seeking ways to get Iran to stop its uranium fuel enrichment program. What better way to accomplish that goal than by covertly creating a virus that will sabotage Natanz’ centrifuges in a way that simulates mechanical failure while overtly supporting the Iranian government by opposing sanctions pushed by the U.S. It’s both simple and elegant. Even if the worm was discovered before it accomplished its mission, who would blame China, Iran’s strongest ally, when the most obvious culprits would be Israel and the U.S.?
Reviewing The Evidence
China has an intimate knowledge of Iran’s centrifuges since, according to one source quoted above, they’re of Chinese design.
China has better access than any other country to manufacturing plans for the Vacon frequency converter drive made by Vacon’s Suzhou facility and specifically targeted by the Stuxnet worm (along with an Iranian company’s drive). Furthermore, in March 2010, China’s Customs ministry started an audit at Vacon’s Suzhou facility and took two employees into custody thereby providing further access to Vacon’s manufacturing specifications under cover of an active investigation.
China has better access than any other country to RealTek’s digital certificates through it’s Realsil office in Suzhou and, secondarily, to JMicron’s office in Taiwan.
China has direct access to Windows source code, which would explain how a malware team could create 4 key zero day vulnerabilities for Windows when most hackers find it challenging to develop even one.
There were no instances of Stuxnet infections in the PRC until very late which never made sense to me, particularly when Siemens software is pervasive throughout China’s power installations. Then, almost as an after-thought and over three months from the time the virus was first discovered, Chinese media reported one million infections, and here’s where the evidence becomes really interesting.
That report originated with a Chinese antivirus company called Rising International, who we now know colluded with an official in Beijing’s Public Security Bureau to make announcements encouraging Chinese citizens to download AV software from Rising International (RI) to fight a new virus that RI had secretly created in its own lab. Considering this new information, RI’s Stuxnet announcement sounds more like a CYA strategy from the worm’s originators than anything else.
In Summary
The conventional wisdom on which nation state was responsible for the Stuxnet worm has relentlessly pointed the finger at Israel or the United States almost from day one of the worm’s discovery. No other scenarios were discussed or even considered with the exception of my own conjecture about India’s INSAT-4b satellite failure and Britain’s Heysham 1 nuclear plant shutdown, and then my white paper proposing 4 additional alternative scenarios; all of which were my way of trying (and failing) to expand the discussion beyond Israel and Iran. The appeal of a U.S. or Israeli cyber attack against first Bushehr, then Natanz, was just too good to pass up even though there was no hard evidence and very slim circumstantial evidence to support a case for either country. The best that Ralph Langner, CEO of Langner Communications (and the leading evangelist for this scenario) could point to was an obscure Hebrew word for Myrtus and a biblical reference for a date found in the malware that pertained to Persia; both of which could have been explained in a half dozen alternate ways having nothing to do with either Israel or the U.S.
As far as China goes, I’ve identified 5 distinct ties to Stuxnet that are unique to China as well as provided a rationale for the attack which fits China’s unique role as Iran’s ally and customer, while opposing Iran’s fuel enrichment plans. There’s still a distinct lack of information on any other facilities that suffered damage, and no good explanations for why there was such massive collateral damage across dozens of countries if only one or two facilities in one nation state were the targets however based solely on the known facts, I consider China to be the most likely candidate for Stuxnet’s origin.

Post Your Comment
You must be logged in to post a comment
Members
Log in with your Forbes account
Haven't Registered Yet?
Create an account to join Forbes now
[...] Stuxnet’s Finnish-Chinese Connection Did China target Iran’s Natanz nuclear facility? Read more on Forbes [...]
[...] More info Filed Under: Financial [...]
[...] Read more on Forbes [...]
[...] Stuxnet’s Finnish-Chinese connection (Forbes) [...]
[...] A logical alternative theory of who targeted Iran: In 2008, China decided to assist the IAEA inspectors after it learned that Iran was in possession of blueprints to shape uranium metal into warheads, according to this article in The Telegraph. That same article discloses that Chinese designs for centerfuges were discovered in Iran, supplied via Pakistan’s AQ Khan. [...]
[...] Finnish-Chinese Connection Have Natanz target China’s nuclear Iran? Learn more about Forbes Geekmas 12 days In recent days we have here in GeekTech were sharing some points of our [...]
[...] Darned compelling, and darned depressing. Not only because it snatches away our vicarious pride in U.S./Israeli ingenuity, but it feeds into western jitters about Chinese omnicompetence. Why, I’ll bet it was those Shanghai teens who cooked this thing up. During recess. [...]
[...] Forbes reports: [...]
[...] Madrigal points me to this piece, by Jeffrey Carr, positing a possible Finnish-Chinese connection to the virus: I [...]
[...] Carr suggests Stuxnet may have been a gambit by China to stop Iran's nuclear program without undermining the relationship with its third largest supplier [...]
[...] From Forbes: [...]
[...] The year is 1983 and a boy named David finds his way into a top-secret military server and potentially kicks off a world war. It turns out that David is only a character played by actor Matthew Broderick in a film called “War Games”. Fast forward to 2010 and a nuclear facility in Iran inexplicably becomes compromised. It turns out the facility has been attacked by a computer virus. This is not fiction. No actors here. What’s more, the source of the attack is not 100% clear. It might have been Israel. It might have been China. [...]
[...] a white paper entitled ‘Dragons, Tigers, Pearls, and Yellowcake’ in which I proposed four alternative scenarios for the Stuxnet worm other than the commonly held assumption that it was Israel or the US targeting Iran’s Bushehr [...]
[...] Stuxnet’s Finnish-Chinese Connection – The Firewall – the world of security –… [...]
[...] Jeffrey Carr thinks that China is the most likely culprit behind Stuxnet. Hmmm, seems odd but who knows? They get blamed for everything cyber so let’s add Stuxnet. [...]
[...] 感染伊朗核电站工业设备的Stuxnet蠕虫,其幕后制作者一般被认为是以色列情报机构或是美国和以色列联手制作,但是否有更多国家参与了这场没有硝烟的网络战?福布斯网站一篇博客认为,中国和芬兰在整个事件中扮演了重要角色(PDF)。 [...]
[...] grenade a été dégoupillée dans Forbes le 14 décembre (ici). Précisons que le papier de Jeffrey Carr, pourtant repris par Dark Reading (ici) a été [...]
[...] Stuxnet’s Finnish-Chinese Connection [...]
[...] into Cyberwar. According to the original article published by Forbes, Iran is started to attack China as it might be involved in developing and distributing Stuxnet [...]
[...] I wrote “Stuxnet’s Finnish-Chinese Connection“, I supported my theory that the People’s Republic of China developed the Stuxnet worm with [...]
[...] się 2 przeciwstawne teorie. Forbes przedstawia dowody, że za Stuxnetem stoją Chińczycy i Finowie — z kolei New York Times twierdzi, że Stuxnet to efekt współpracy pomiędzy wywiadem USA i [...]
[...] Jeffrey Carr at det ikke er sandsynligt at Israel er involveret. Han argumenterer i stedet for at Kina står bag. Og historien bliver i min optik ikke mindre fascinerende af at få endnu en udlægning! [...]
[...] Stuxnet: from China to Iran, with love? http://blogs.forbes.com/firewall/2010/12/14/stuxnets-finnish-chinese-connection/ [...]
[...] other major theory circulating comes from Jeffrey Carr over at Forbes (“Stuxnet’s Finnish-Chinese Connection”). He contends that China actually had a major incentive to perpetrate the attack, and proceeds to [...]
[...] article that makes a compelling case that the Stuxnet worm that has disrupted Iran’s nuclear program originated ironically from China (and not the U.S., Britain, or [...]
[...] moins inspirée. Par exemple, puisqu’on parle d’origine, Forbes nous traçait l’origine du ver du côté de la Chine il y a à peine un mois et ne nous aura pas fait attendre pour réfuter les affirmation du New York [...]
[...] http://blogs.forbes.com/firewall/2010/12/14/stuxnets-finnish-chinese-connection/#more-2513 [...]
[...] Carr writing for Forbes has a different version of the events which can be read here. He responds to the Times' article here. Carr suggests that the authors of the Times piece do not [...]