Armed Polite Society

Main Forums => The Roundtable => Topic started by: geronimotwo on September 22, 2010, 03:15:44 PM

Title: stuxnet malware "weapon"
Post by: geronimotwo on September 22, 2010, 03:15:44 PM
this new type of worm is designed to attack a specified industrial process.  although no one is entirely sure whose process is at risk, they suspect it is for the iranian bushehr nuclear plant.

http://news.yahoo.com/s/csm/327178

any thoughts on who might want to develop this cyber-terror?
Title: Re: stuxnet malware "weapon"
Post by: PTK on September 22, 2010, 03:35:10 PM
I think Yahoo is, as usual, playing it up. This smacks of absurdity - manual and hydraulic controls aren't connected to the internet - PERIOD.
Title: Re: stuxnet malware "weapon"
Post by: tyme on September 22, 2010, 03:45:04 PM
Huh?  Stuxnet does not rely on access to the intarwebnet.
Title: Re: stuxnet malware "weapon"
Post by: PTK on September 22, 2010, 03:59:53 PM
...to get on the target machine? It would need some form of hookup, no matter how many separations from the connection to the internet (USB and flash drive, CD, etc.) it would still need to have been exposed. I'm just not seeing how a computer that controls extremely important sensitive items would ever be attached to the internet for any reason. =|
Title: Re: stuxnet malware "weapon"
Post by: cassandra and sara's daddy on September 22, 2010, 04:22:54 PM
Stuxnet might have been spread by the USB memory sticks  used by a Russian contractor while building the Bushehr nuclear plant, Langner offers. The same contractor has jobs in several countries where the attackware has been uncovered.
Title: Re: stuxnet malware "weapon"
Post by: PTK on September 22, 2010, 04:31:13 PM
'swhat I get for not reading Yahoo articles. :laugh:
Title: Re: stuxnet malware "weapon"
Post by: AJ Dual on September 22, 2010, 04:35:58 PM
So farking cool...  =D

I really hope it was the U.S.

For the record, we actually are the best at this.  [ar15]

http://www.freerepublic.com/focus/f-news/1071087/posts
Title: Re: stuxnet malware "weapon"
Post by: AZRedhawk44 on September 22, 2010, 04:36:25 PM
Sounds like a nice thing to have for going through customs.

"I must inspect your <<data storage device or computing appliance>>." :police:

"Sure, go on ahead." >:D
Title: Re: stuxnet malware "weapon"
Post by: RevDisk on September 22, 2010, 04:39:08 PM
I think Yahoo is, as usual, playing it up. This smacks of absurdity - manual and hydraulic controls aren't connected to the internet - PERIOD.

ROFL

Gods, how I wish that wasn't true. 
Title: Re: stuxnet malware "weapon"
Post by: AJ Dual on September 22, 2010, 04:41:47 PM
Also, the last bit of code in hex: DEADF007... whoever wrote it might have a sense of humor.  =)
Title: Re: stuxnet malware "weapon"
Post by: mtnbkr on September 22, 2010, 04:48:12 PM
I work for an MSSP and have seen attacks against SCADA systems before.  Those tend to be DOS type attacks though.

Chris
Title: Re: stuxnet malware "weapon"
Post by: bedlamite on September 22, 2010, 04:55:29 PM
So farking cool...  =D

I really hope it was the U.S.

For the record, we actually are the best at this.  [ar15]

http://www.freerepublic.com/focus/f-news/1071087/posts

No, It wasn't the US. It was Israel. They wrote it and had microbalrog upload it to a shovel porn site that was frequented by Russian nuke techs.
Title: Re: stuxnet malware "weapon"
Post by: AJ Dual on September 22, 2010, 04:59:00 PM
 :lol:

And we know it's Jewish code because it waits until the Sabbath is over before attacking?  :angel:
Title: Re: stuxnet malware "weapon"
Post by: lee n. field on September 22, 2010, 05:27:56 PM
I think Yahoo is, as usual, playing it up. This smacks of absurdity - manual and hydraulic controls aren't connected to the internet - PERIOD.

Wouldn't count on it.  I recall reading, some years ago, about a machine tool that was also a source of spam.
Title: Re: stuxnet malware "weapon"
Post by: Angel Eyes on September 22, 2010, 07:04:56 PM

According to an article at McAfee, their DAT and engine have been cleaning it since 7/16 this year. 

Title: Re: stuxnet malware "weapon"
Post by: AJ Dual on September 22, 2010, 07:56:13 PM
According to an article at McAfee, their DAT and engine have been cleaning it since 7/16 this year. 



Except for the versions licensed in Iran.  =D
Title: Re: stuxnet malware "weapon"
Post by: RocketMan on September 22, 2010, 09:27:39 PM
It doesn't require that the target system be connected to the web.  All that is necessary is a stupid contractor to connect an infected USB drive while installing an update to the software.  I have seen it happen, and it's not pretty when an entire group of machines across a large, closed national network is affected.
Title: Re: stuxnet malware "weapon"
Post by: Antibubba on September 26, 2010, 05:42:31 PM
Quote
I really hope it was the U.S.

I'm also betting on Israel.

http://news.yahoo.com/s/ap/20100925/ap_on_re_us/un_un_ahmadinejad_29   Interesting timing, wouldn't you say?
Title: Re: stuxnet malware "weapon"
Post by: Perd Hapley on October 13, 2010, 12:32:23 AM
Microsoft just fixed the problem:

http://www.reuters.com/article/idUSN1220677620101012

Although at the end of the article, they mention that only 3 of the 4 vulnerabilities were addressed.  =|
Title: Re: stuxnet malware "weapon"
Post by: 230RN on October 13, 2010, 04:54:05 AM
Quote
I'm also betting on Israel.

Do you have to read the code right-to-left?

DEADF007

700DAED