0
1969912

STUXNET

Recommended Posts

CIA most likely. Possibly with the co-operation of Siemans themselves or some people very well versed in the industrial automation sector. It's kinda neat but kinda scary. I work in industrial automation and feel that for far too long security was never really taken seriously in this niche market of networking. In my company we take securing our operations networks very seriously, but alot of companies do not. Although this seems to be limited to Siemans controllers, Allen Bradley has similar vulnerabilities. In the US Allen Bradley is more typically used than Siemans but they both can be taken advantage of. This is kind of neat for me because more poeple ask me questions about industrial control than ever used to. I don't think that the general public has any idea how networked and how complicated industrial control has become. All of our new machinery talks to eachother through some kind of network protocol, and everything can be viewed and modified by corporate over the net. I'm sure that in this instance they had a similar set up running with V-lans and such, so someone with the proper knowledge was able to easily infiltrate. I'm honestly surprised that the "great and almighty" Iran even acknowledged that there was ever an issue. They seem to be in complete denial about everything else. [:/]

Share this post


Link to post
Share on other sites
Guest
Inquiring minds would ask why Siemens AG made their SCADA applications to run on the most vulnerable of operating systems - Windows, fer cryin' out loud.

Anyone with brains would have set it up for Unix.

mh
.
"The mouse does not know life until it is in the mouth of the cat."

Share this post


Link to post
Share on other sites
Guest

OMG that is awesome! Great story, and it couldn't have happened to a nicer bunch of people :D:SB|

mh
.

"The mouse does not know life until it is in the mouth of the cat."

Share this post


Link to post
Share on other sites
Quote

Inquiring minds would ask why Siemens AG made their SCADA applications to run on the most vulnerable of operating systems - Windows, fer cryin' out loud.



I wrote this part off as questionable - the release of windows 7 was a bit too recent to seem plausible for the timelines, nevermind the technology.

Share this post


Link to post
Share on other sites
Quote

I wrote this part off as questionable - the release of windows 7 was a bit too recent to seem plausible for the timelines, nevermind the technology.



I question this part as well

"During this time the worms reported back to two servers that had to be run by intelligence agencies, one in Denmark and one in Malaysia. The servers monitored the worms and were shut down once the worm had infiltrated Natanz. "

I thought these systems were on isolated networks which is why they couldn't get to them directly in the first place. If the networks are isolated, how did the worms report back to the servers?
Time flies like an arrow....fruit flies like a banana

Share this post


Link to post
Share on other sites
Quote

Quote

I wrote this part off as questionable - the release of windows 7 was a bit too recent to seem plausible for the timelines, nevermind the technology.



I question this part as well

"During this time the worms reported back to two servers that had to be run by intelligence agencies, one in Denmark and one in Malaysia. The servers monitored the worms and were shut down once the worm had infiltrated Natanz. "

I thought these systems were on isolated networks which is why they couldn't get to them directly in the first place. If the networks are isolated, how did the worms report back to the servers?



And even if they did, how does Fox news know all this?

The article is a great read, and extremely interesting if even half of it is true, but the level of detail in several areas doesn't ring true.
Do you want to have an ideagasm?

Share this post


Link to post
Share on other sites
Frequently SCADA networks that are to be air gapped and not accessible really are via some back channel item. Welcome to the human factor that its easier to do this if I just open up a port here or miswired something there.
Yesterday is history
And tomorrow is a mystery

Parachutemanuals.com

Share this post


Link to post
Share on other sites
Quote

Quote

I wrote this part off as questionable - the release of windows 7 was a bit too recent to seem plausible for the timelines, nevermind the technology.



I question this part as well

"During this time the worms reported back to two servers that had to be run by intelligence agencies, one in Denmark and one in Malaysia. The servers monitored the worms and were shut down once the worm had infiltrated Natanz. "

I thought these systems were on isolated networks which is why they couldn't get to them directly in the first place. If the networks are isolated, how did the worms report back to the servers?



The most insecure part of any secure system are the people who use it, don't underestimate the pull of the internet for bored physicists sitting at work, I've seen it before.
When an author is too meticulous about his style, you may presume that his mind is frivolous and his content flimsy.
Lucius Annaeus Seneca

Share this post


Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

0