Visit the Ironworks Gaming Website Email the Webmaster Graphics Library Rules and Regulations Help Support Ironworks Forum with a Donation to Keep us Online - We rely totally on Donations from members Donation goal Meter

Ironworks Gaming Radio

Ironworks Gaming Forum

Go Back   Ironworks Gaming Forum > Ironworks Gaming Forums > General Discussion
FAQ Calendar Arcade Today's Posts Search

Reply
 
Thread Tools Search this Thread
Old 09-26-2010, 09:07 AM   #1
VulcanRider
Lord Soth
 

Join Date: July 25, 2002
Location: Melbourne FL
Age: 59
Posts: 1,971
Default War from a cubicle?

Join us for lunch?
Sure, just let me start WWIII... *CLICK* Ok. Pizza?

From Philosophy of Science Portal
Quote:
Cyber security experts say they have identified the world's first known cyber super weapon designed specifically to destroy a real-world target – a factory, a refinery, or just maybe a nuclear power plant.

The cyber worm, called Stuxnet, has been the object of intense study since its detection in June. As more has become known about it, alarm about its capabilities and purpose have grown. Some top cyber security experts now say Stuxnet's arrival heralds something blindingly new: a cyber weapon created to cross from the digital realm to the physical world – to destroy something.

At least one expert who has extensively studied the malicious software, or malware, suggests Stuxnet may have already attacked its target – and that it may have been Iran's Bushehr nuclear power plant, which much of the world condemns as a nuclear weapons threat.

The appearance of Stuxnet created a ripple of amazement among computer security experts. Too large, too encrypted, too complex to be immediately understood, it employed amazing new tricks, like taking control of a computer system without the user taking any action or clicking any button other than inserting an infected memory stick. Experts say it took a massive expenditure of time, money, and software engineering talent to identify and exploit such vulnerabilities in industrial control software systems.

Unlike most malware, Stuxnet is not intended to help someone make money or steal proprietary data. Industrial control systems experts now have concluded, after nearly four months spent reverse engineering Stuxnet, that the world faces a new breed of malware that could become a template for attackers wishing to launch digital strikes at physical targets worldwide. Internet link not required.

"Until a few days ago, people did not believe a directed attack like this was possible," Ralph Langner, a German cyber-security researcher, told the Monitor in an interview. He was slated to present his findings at a conference of industrial control system security experts Tuesday in Rockville, Md. "What Stuxnet represents is a future in which people with the funds will be able to buy an attack like this on the black market. This is now a valid concern."
.
.
Stuxnet surfaced in June and, by July, was identified as a hypersophisticated piece of malware probably created by a team working for a nation state, say cyber security experts. Its name is derived from some of the filenames in the malware. It is the first malware known to target and infiltrate industrial supervisory control and data acquisition (SCADA) software used to run chemical plants and factories as well as electric power plants and transmission systems worldwide. That much the experts discovered right away.
.
.
So far, Stuxnet has infected at least 45,000 industrial control systems around the world, without blowing them up – although some victims in North America have experienced some serious computer problems, Eric Byres, a Canadian expert, told the Monitor. Most of the victim computers, however, are in Iran, Pakistan, India, and Indonesia. Some systems have been hit in Germany, Canada, and the US, too. Once a system is infected, Stuxnet simply sits and waits – checking every five seconds to see if its exact parameters are met on the system. When they are, Stuxnet is programmed to activate a sequence that will cause the industrial process to self-destruct, Langner says.

Langner's analysis also shows, step by step, what happens after Stuxnet finds its target. Once Stuxnet identifies the critical function running on a programmable logic controller, or PLC, made by Siemens, the giant industrial controls company, the malware takes control. One of the last codes Stuxnet sends is an enigmatic “DEADF007.” Then the fireworks begin, although the precise function being overridden is not known, Langner says. It may be that the maximum safety setting for RPMs on a turbine is overridden, or that lubrication is shut off, or some other vital function shut down. Whatever it is, Stuxnet overrides it, Langner’s analysis shows.

"After the original code [on the PLC] is no longer executed, we can expect that something will blow up soon," Langner writes in his analysis. "Something big."


The folks at Symantec are working on it...

Quote:
We’ve been analyzing W32.Stuxnet, which is a threat that uses a legitimate digital certificate from a major third party and takes advantage of a previously unknown bug in Windows; ultimately, it searches for SCADA systems and design documents. The findings of our analysis are being documented in a series of blog articles.
Stuxnet contacts two remote servers for command and control, and until last week those domains were pointing to a server hosted in Malaysia. Once we identified those domains, we redirected traffic away from the C&C servers thereby preventing them from controlling the infected machines and retrieving stolen information.
Experts say Stuxnet worm could be state-sponsored
Quote:
The Stuxnet computer worm that may have been designed to attack a nuclear facility in Iran could have been state sponsored, according to two security experts with whom I spoke.
"We can tell by the code that it's very, very complex to the degree that this type of code had to be done, for example, by a state and not, for example, some hacker sitting in his parents basement," said Symantec security researcher Eric Chien. Chien added, however, that "there's nothing in the code that points to the particular author" or "what their motivation is." (Scroll down to listen to entire Chien interview.)

TrendMicro security researcher Paul Ferguson agrees that Stuxnet was likely state-sponsored. "The amount of technical expertise that went into this doesn't appear to have been by some random lone individual person because they would have had to have access to these systems to develop this."

Ferguson said "it is a big deal because the utility companies, and manufacturing communities and the power companies and gas and oil companies for years have been using closed propriety systems to manage their infrastructure and over the course of the past few years they've been making business decisions to use off-the-shelf software like Windows." He added that now we're seeing the same threat as with other networks as facilitates are connected to the Internet or allow access to thumb drives. This type of threat, according to Ferguson, is "absolutely new and that's why a lot of people in the intelligence community, in the Department of Homeland Security and different governments around the world are really kind of spooked by this development. It shows the targeted nature and sophistication of the criminal/espionage aspect to this."
The "Blue Screen of Death" just took on a whole new meaning...
.
__________________

-----
Help feed animals in shelters with just a mouse click at The Animal Rescue Site !!
VulcanRider is offline   Reply With Quote
Old 09-26-2010, 10:28 AM   #2
johnny
40th Level Warrior
 
Ms Pacman Champion
Join Date: April 15, 2002
Location: Utrecht The Netherlands
Age: 58
Posts: 16,981
Default Re: War from a cubicle?

Created for certain facilities in Iran...ahem.
__________________
johnny is offline   Reply With Quote
Old 09-26-2010, 05:18 PM   #3
Hindsight
The Magister
 

Join Date: October 23, 2009
Location: Ontario
Posts: 111
Default Re: War from a cubicle?

Great font colours dude!!
Hindsight is offline   Reply With Quote
Old 09-26-2010, 05:51 PM   #4
Firestormalpha
Knight of the Rose
 
Zelda Champion Snake Champion
Join Date: July 11, 2002
Location: Coral Springs, Fl USA
Age: 40
Posts: 4,454
Default Re: War from a cubicle?

Scary if an enemy state gets their hands on this kind of stuff. Scarier still, if a terrorist organization gets their hands on it.
__________________
"When you start with a presupposition, it's hard to arrive at any other conclusion."

"We are never to judge a philosophy by its abuse." - Augustine

"If you're wondering if God has a sense of humor, consider the platypus."

http://www.greaterthings.cbglades.com
Firestormalpha is offline   Reply With Quote
Old 09-26-2010, 06:41 PM   #5
Gabrielles blades
Baaz Draconian
 

Join Date: April 26, 2002
Location: florida
Age: 42
Posts: 761
Default Re: War from a cubicle?

even more scary is that normal hackers are probably going to get their hands on this, study it, and implement it for windows.

as for protected industry from this threat - i would suggest just isolating important systems from computers so that they are human controlled instead.
Gabrielles blades is offline   Reply With Quote
Old 09-26-2010, 08:00 PM   #6
Hivetyrant
Jack Burton
 

Join Date: August 24, 2002
Location: Aussie now in the US of A!
Age: 37
Posts: 5,403
Default Re: War from a cubicle?

Quote:
Originally Posted by Gabrielles blades View Post
as for protected industry from this threat - i would suggest just isolating important systems from computers so that they are human controlled instead.
Unfortunately much easier said than done
There are few process systems on the planet that aren't computer controlled, the cost just can't be compared.

The human factor is often at fault for these types of infections.
Our process network is completely separate from our business LAN and despite much user training and prevention methods, infections are still happening (though not often)

There are more and more virus's turning up that are targeting SCADA systems which is both interesting and worrying, we have had some healthy discussions at my work around the intention and future of this kind of thing, it is very possible that one day people will be able to purchase these kinds of "Weapons" both from a company competition standpoint and just people wanting to be a$$holes.

Might sound like silly conspiracy stuff now, but you all know as well as I do that there are more than enough people out there with no time and no morals willing to write these programs, and there are certainly enough people out there willing to us them fro personal gain.
Hivetyrant is offline   Reply With Quote
Old 09-27-2010, 06:51 AM   #7
Hindsight
The Magister
 

Join Date: October 23, 2009
Location: Ontario
Posts: 111
Default Re: War from a cubicle?

Perhaps the Amish have the right idea after all?
Hindsight is offline   Reply With Quote
Reply


Currently Active Users Viewing This Thread: 1 (0 members and 1 guests)
 

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is On

Forum Jump

Similar Threads
Thread Thread Starter Forum Replies Last Post
Fantastic Cubicle Prank... Bungleau General Discussion 3 02-01-2008 08:12 PM
Top 10 Drawbacks to working in a cubicle harleyquinn General Conversation Archives (11/2000 - 01/2005) 2 01-29-2003 08:20 PM


All times are GMT -4. The time now is 06:22 AM.


Powered by vBulletin® Version 3.8.3
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
©2024 Ironworks Gaming & ©2024 The Great Escape Studios TM - All Rights Reserved