Page 4 of 4

Posted: Wed Feb 02, 2011 2:04 am
by choff
The Symantec article on Stuxnet. This was no script kiddie output, they needed the actual centrifuges used by the Iranians to test it. Remember, its being passed by sneakernet through more than one OS or app, both for delivery and for reporting back to its makers. It has to bypass multiple security programs undetected, and outright destruction is a dead giveaway, it had to do its work slowly.

Posted: Wed Feb 02, 2011 7:41 am
by icarus
Yeah but without getting distracted by the all the bells and whistles of stuxnet, the guts is that it can get into the PLCs .... you only need that bit of it and you can adapt it to whatever the heck you want to plant and machinery controlled by them ... simplest being, even if you have no idea what the plant does, just crash the PLC and see what blows up.

Crashing an Emergency Shut Down (ESD) PLC at any plant is taking out the last line of defence to events becoming seriously uncontrollable for most modern plants handling volatile materials and unstable processes ...

Posted: Fri Feb 04, 2011 4:56 am
by choff
icarus wrote:Yeah but without getting distracted by the all the bells and whistles of stuxnet, the guts is that it can get into the PLCs .... you only need that bit of it and you can adapt it to whatever the heck you want to plant and machinery controlled by them ... simplest being, even if you have no idea what the plant does, just crash the PLC and see what blows up.

Crashing an Emergency Shut Down (ESD) PLC at any plant is taking out the last line of defence to events becoming seriously uncontrollable for most modern plants handling volatile materials and unstable processes ...
It was either infect the PLC's or military action, the lesser of two evils. We have to expect the bad guy's will try this sooner or later regardless if we do it first. Yes, you can write a code that corrupts the PLC, but if you want to do it and not get caught, you need a shrewd delivery system.

Posted: Fri Oct 21, 2011 8:41 am
by DaxG
Iranian nuclear-control computer systems, last year, were infected with a computer worm called Stuxnet. A second similar malware has been found. Here's a proof: Duqu virus uses Stuxnet DNA to mine industrial data. Dubbed Duqu, the virus was intended to mine information from European commercial computers.

Posted: Mon Oct 24, 2011 3:41 am
by mdeminico
I don't know about you guys, but it's a shame they couldn't make something like this happen:

http://www.damninteresting.com/the-farewell-dossier/

Posted: Mon Oct 24, 2011 7:49 am
by choff
Sooner or later some Chinese hackers will get burned the same way. That might teach them the value of copyrights and patent law.