Armed Polite Society
Main Forums => The Roundtable => Topic started by: geronimotwo on September 22, 2010, 03:15:44 PM
-
this new type of worm is designed to attack a specified industrial process. although no one is entirely sure whose process is at risk, they suspect it is for the iranian bushehr nuclear plant.
http://news.yahoo.com/s/csm/327178
any thoughts on who might want to develop this cyber-terror?
-
I think Yahoo is, as usual, playing it up. This smacks of absurdity - manual and hydraulic controls aren't connected to the internet - PERIOD.
-
Huh? Stuxnet does not rely on access to the intarwebnet.
-
...to get on the target machine? It would need some form of hookup, no matter how many separations from the connection to the internet (USB and flash drive, CD, etc.) it would still need to have been exposed. I'm just not seeing how a computer that controls extremely important sensitive items would ever be attached to the internet for any reason. =|
-
Stuxnet might have been spread by the USB memory sticks used by a Russian contractor while building the Bushehr nuclear plant, Langner offers. The same contractor has jobs in several countries where the attackware has been uncovered.
-
'swhat I get for not reading Yahoo articles. :laugh:
-
So farking cool... =D
I really hope it was the U.S.
For the record, we actually are the best at this. [ar15]
http://www.freerepublic.com/focus/f-news/1071087/posts
-
Sounds like a nice thing to have for going through customs.
"I must inspect your <<data storage device or computing appliance>>." :police:
"Sure, go on ahead." >:D
-
I think Yahoo is, as usual, playing it up. This smacks of absurdity - manual and hydraulic controls aren't connected to the internet - PERIOD.
ROFL
Gods, how I wish that wasn't true.
-
Also, the last bit of code in hex: DEADF007... whoever wrote it might have a sense of humor. =)
-
I work for an MSSP and have seen attacks against SCADA systems before. Those tend to be DOS type attacks though.
Chris
-
So farking cool... =D
I really hope it was the U.S.
For the record, we actually are the best at this. [ar15]
http://www.freerepublic.com/focus/f-news/1071087/posts
No, It wasn't the US. It was Israel. They wrote it and had microbalrog upload it to a shovel porn site that was frequented by Russian nuke techs.
-
:lol:
And we know it's Jewish code because it waits until the Sabbath is over before attacking? :angel:
-
I think Yahoo is, as usual, playing it up. This smacks of absurdity - manual and hydraulic controls aren't connected to the internet - PERIOD.
Wouldn't count on it. I recall reading, some years ago, about a machine tool that was also a source of spam.
-
According to an article at McAfee, their DAT and engine have been cleaning it since 7/16 this year.
-
According to an article at McAfee, their DAT and engine have been cleaning it since 7/16 this year.
Except for the versions licensed in Iran. =D
-
It doesn't require that the target system be connected to the web. All that is necessary is a stupid contractor to connect an infected USB drive while installing an update to the software. I have seen it happen, and it's not pretty when an entire group of machines across a large, closed national network is affected.
-
I really hope it was the U.S.
I'm also betting on Israel.
http://news.yahoo.com/s/ap/20100925/ap_on_re_us/un_un_ahmadinejad_29 Interesting timing, wouldn't you say?
-
Microsoft just fixed the problem:
http://www.reuters.com/article/idUSN1220677620101012
Although at the end of the article, they mention that only 3 of the 4 vulnerabilities were addressed. =|
-
I'm also betting on Israel.
Do you have to read the code right-to-left?
DEADF007
700DAED