![]() |
The Stuxnet Malware
http://news.yahoo.com/s/csm/327178
Quote:
|
Quote:
|
Quote:
IF,,, If this code is to be effective, it must be very very specific in nature. The code would need to "look" for the exact make & model of a PLC, and also the exact function it is to FU, But it can and will look anywhere it is inserted.. I would think that the only way to make it work would be to create the code as the target code is written.. In other words,, The developer is the destroyer.. :munchin It will be interesting to watch this roll out.. "At a nuclear power plant, in the control room, they sense an over heating scenario, and trip the emergency shut down process,, Stuxnet reverses the core rods direction" :boohoo:boohoo:boohoo Ba Da Bing, Ba Da Boom... |
The malware was targeted toward an exact configuration.
In lay words, suppose you intecepted communications to an unknown agent that said: INSTRUCTIONS FOR BOMBING MISSION 1 - Enter the building through the blue door on the east side. If there is no door on the east side of the building, or if it is not blue, go home and forget the mission. 2 - Look at the clock, if it is after 3:00 am and before 4:00 am, travel 20 meters down the hallway and turn right, entering through the green door. If it is not after 3:00 am and before 4:00 am, wait, and check your watch again in ten minutes. 3 - When you enter through the green door you should be in an office. If you are not in an ofice, go home and forget the mission. 3 - Look to the left. There should be a brown desk against the wall. If there is no desk against the wall, or if it is not brown, go home and forget the mission. 4 - Look at the top of the brown desk against the wall. It should have a telephone number of 555-1212. If there is no telephone, or if the number is not 555-1212, go home and forget the mission. 5 - Go to the desk and open the second drawer on the right. If there is no drawers on the right, go home and forget your mission. 6 - If there is a piece of yellow paper in the bottom of the desk, put your bomb in the drawer, set the timer for ten minutes, and exit the building. If there is no piece of paper in the bottom of the drawer, or if it is not yellow, go home and forget your mission. === Obviously, whoever wrote those instructions was specifically targeting one particular drawer in one particular desk, in one particular office in one particular building in the world. The instructions may have been openly printed in the Wall Street Journal, the New York Times, and the Times of London, but that still doesn't tell you who/what the target is, or the source of the instructions. If every single agent began checking every single building worldwide, all but one will end up "going home and forgetting the mission" because something won't be right. But the one who succeeds with each step to the end, will plant the bomb. It's impossible to tell who, or what, the target is. A factory? A warehouse? A hospital? A university? A power plant? But you can bet that worldwide intelligence agencies are looking at building after building, looking at east doors, painted blue, with 20 meter hallways, and green doors, with a desk, etc. The actual "steps" are certain Programable Logic Controllers that have been assigned certain network addresses and accept and execute certain functions as specified by certain hexadecimal codes. Some of the actual digits being sought, as well as the digits to be (falsely) transmitted once "inside" are encrypted within the malware, making it even more difficult to determine the steps being researched to qualify the target and the digits to be sent to execute the mission. Just getting to the plain text of the malware is itself an NSA level codebreaking operation. In the example above, the color of the doors, or the piece of paper, would be encrypted so only the agent knows what he is looking for. So first you have to uncrypt the colors, THEN use logic and brute force comparisons, to figure out the target. Clever stuff. I hope it is one of ours, and a nuclear scramble in Iran would be fine with me. |
Quote:
If you set aside the nuclear plausibilities,, and look at a different angle... Suppose this was just some kid that wanted to be a hot-shot and prove his worth in the company??? You figure you can be a STAR IF you guarantee that your company receives the support contract for the project.. After you received said the contract and because of "problems" you discovered in the initial design,, you suggest a need for a re-design the product?? Of course this would be a very expensive re-write, but you COULD guarantee customer satisfaction,, Because you have the fix in your pocket,, you designed it that way?? This could be a geek to geek thing.. Purpose built back-door coding is not new... A lot of 60t'ys & 70t's systems were built with hard wire back-doors that allowed designers access to de-bug and fix hex level coding. One I remember well was the FF0F check point re-start for the S360 model 65 system. The dam thing locked up 2-3 times a night when running engineering designs. System looked like it was running fine but was actually in a redundant binary loop. Early PC's had a set of jumper pins on the mobo that allowed a configuration reset.. Until someone can find the target, you will not know the intended results.. So The hunt is on Doctor.. Quote:
|
This gets more interesting by the day.
Quote:
|
2 Attachment(s)
Remember this destroyed power generation unit at the Sayano-Shushenskaya Dam in Russia?
In that case the official reason for the destruction was a simple "overspeed" of one of the turbines. When there is the mass of five or six M1 tanks spinning over 200 rpm, it has to be perfectly balanced and well lubricated. If malware were to shut off the lubrication, vary the loads and get the generator out of phase with the other transformers, or even close the water valves too quickly (creating a water hammer) the result would be equally destructive. It would be destroyed without a blasting cap, or a single block of C4. In fact, it would be almost impossible after the fact to reconstruct exactly what caused the turbine to break loose. |
I do not recall that incident, but I know all too well what happens when control valves fail or malfunction....water hammer....super heated steam in a cold line....it is bad stuff and generally creates a lot of down time.
|
1 Attachment(s)
I'm curious if Iranian tech support is in India :confused: :D
It's gotta be a Zionist conspiracy :D Attachment 16662 |
I'm reminded of William Gibson's Neuromancer.
As this technology gets more and more refined, things could become pretty interesting out there! |
http://www.cnn.com/2010/WORLD/meast/...ests/?hpt=Sbin
Iran arrests 'nuclear spies,' intelligence chief says By the CNN Wire Staff October 3, 2010 7:56 a.m. EDT (CNN) -- Iran arrested a number of "nuclear spies," its intelligence minister said, in the wake of widespread reports of a sophisticated new computer virus that may have been aimed at Iran. Intelligence Minister Heydar Moslehi made the announcement Saturday, without giving any details, Iran's semiofficial Mehr news agency reported.... |
This is wild stuff. Pretty scary when you think of all the utilities and industries that are connected to the internet in this country. Electric grids, banking systems, oil and gas pipelines, power plants, banking systems, and transportation systems - just to name a few. If you're interested in this topic, "Cyber War", a new book by Richard Clarke is worth a read.
|
Quote:
|
http://www.guardian.co.uk/world/juli...uclear-weapons
Who is killing Iran's nuclear scientists? One senior physicist killed and another wounded in coordinated attacks in Tehran, raising the question of whether there is a nuclear hit-team at work guardian.co.uk, Monday 29 November 2010 16.32 GMT Assassins on motorbikes have killed an Iranian nuclear scientist and wounded another in identical attacks this morning. They drove up to the scientists' cars as they were leaving for work and attached a bomb to each vehicle which detonated seconds later. The man who was killed was Majid Shahriari, a member of the engineering faculty at the Shahid Beheshti in Tehran. His wife was wounded. The second attack wounded Fereidoun Abbasi, who is also a professor at Shahid Besheshti University, and his wife. They are senior figures in Iranian nuclear science. Abbasi was a member of the Islamic Revolutionary Guards, or Pasdaran, and once taught at the Pasdaran-run Imam Hossein University. He was hailed by Mahmoud Ahmadinejad three years ago as Iran's academic of the year. Abbasi is named on UN Security Council resolution 1747 as being "involved in nuclear or ballistic missile activities". The resolution describes him as a "Senior ministry of defence and armed forces logistics scientist with links to the Institute of Applied Physics, working closing closely with Mohsen Fakhrizadeh-Mahabadi" - believed by Western intelligence to be (or have been) in charge of the Iranian nuclear weapons programme. Shahriari co-authored a paper on neutron diffusion in a reactor core with Ali Akbar Salehi, the head of the Iranian Atomic Energy Organisation. Salehi said today Shahriari was in charge of a major project at AEOI. The attacks bear some similarities to the assassination of another nuclear physicist, Masoud Ali Mohammadi, in January. In that attack, the bomb was strapped to a motorcyle and detonated by remote control. You do not have to look far to see a pattern. All three had professional links. Shahriari and Ali Mohammadi were both member of the Sesame Council, which runs a particle accelerator called a synchrotron in Jordan, which brings together scientists from across the region, including Israel. Ali Mohammadi and Abbasi both taught at the IRGC's Imam Hussein University, while both Shahriari and Abbasi are listed as members of the Nuclear Society of Iran.... |
Sounds very Jason Bourne-esque, i.e. Bourne Ultimatum. Just what the world needs is an even more paranoid Mahmoud I'manutjob.
http://movieclips.com/wqXVp-the-bour...-makes-a-kill/ |
| All times are GMT -6. The time now is 21:45. |
Copyright 2004-2022 by Professional Soldiers ®