Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

U.S. power plants at risk of attack by computer virus like Stuxnet

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Latest Breaking News Donate to DU
 
Poll_Blind Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Oct-01-10 01:35 PM
Original message
U.S. power plants at risk of attack by computer virus like Stuxnet
Source: The Washington Post

A sophisticated worm designed to infiltrate industrial control systems could be used as a blueprint to sabotage machines that are critical to U.S. power plants, electrical grids and other infrastructure, experts are warning.

The discovery of Stuxnet which some analysts have called the "malware of the century" because of its ability to damage or possibly destroy sensitive control systems, has served as a wake-up call to industry officials. Even though the worm has not yet been found in control systems in the United States, it could be only a matter of time before similar threats show up here.

"Quite honestly you've got a blueprint now," said Michael J. Assante, former chief security officer at the North American Electric Reliability Corporation, an industry body that sets standards to ensure the electricity supply. "A copycat may decide to emulate it, maybe to cause a pressure valve to open or close at the wrong time. You could cause damage, and the damage could be catastrophic."

Joe Weiss, an industrial control system security specialist and managing partner at Applied Control Solutions in Cupertino, Calif., said "the really scary part" about Stuxnet is its ability to determine what "physical process it wants to blow up." Said Weiss: "What this is, is essentially a cyber weapon."

Researchers still do not know who created Stuxnet, or why.

Read more: http://www.washingtonpost.com/wp-dyn/content/article/2010/10/01/AR2010100104245.html



:popcorn: + :scared:

PB
Printer Friendly | Permalink |  | Top
xchrom Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Oct-01-10 01:39 PM
Response to Original message
1. well, yeah. -- isn't that what you guys are supposed to ready for, etc?
we've been talking about this for what -- two years now?
Printer Friendly | Permalink |  | Top
 
liberal N proud Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Oct-01-10 01:42 PM
Response to Original message
2. From what I understand - the virus attacks primarily Siemens systems
Does anyone know the percentage of power plants using Siemens control systems?

Iran's nuclear facilities are all Siemens systems. Other systems such as Rockwell have not been effected (yet).

This is from our IT people who were asked about it concerning our production facilities and controls.
Printer Friendly | Permalink |  | Top
 
Poll_Blind Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Oct-01-10 02:11 PM
Response to Reply #2
4. A concise answer to your first question is probably not available to the public.
Those PLC's are multi-purpose and could be used to control anything from automated mail sorting hardware, "water supplies, oil rigs, power plants and other industrial facilities"(from here)

The question of power plants using Siemens control systems becomes fuzzier and much more difficult to answer when realizing that the PLC's need only be in control of one specific subsystem in order to wreak havoc on an otherwise non-Siemens "setup". The creators of the malware know what they had in mind, but nobody else does.

Your IT folks should start by checking out this Symantec article which describes, generally, what happens at a hardware level during infection along with contacting any hardware vendors to determine if your industrial machines are controlled by either 6ES7-417 and 6ES7-315-2 Siemens PLC family of CPU's.

PB
Printer Friendly | Permalink |  | Top
 
leveymg Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Oct-01-10 01:49 PM
Response to Original message
3. Here's the headline: Iran Nuke Blowback Blowup.
They'll find a way of blaming it on Iran when something bad happens from this. Just wait, you'll see. :nuke: :hide: :patriot:
Printer Friendly | Permalink |  | Top
 
naaman fletcher Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Oct-01-10 04:30 PM
Response to Original message
5. How about this: Don't plug powerplants into the internet.
Somehow they managed to work before the internet was around. Simply don't have them attached to the internet.
Printer Friendly | Permalink |  | Top
 
Poll_Blind Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Oct-01-10 04:59 PM
Response to Reply #5
6. It doesn't rely on the internet. It relies on USB devices and intranet network shares to propagate.
Unlike most worms, it is very patient and doesn't use typical vectors to spread.

PB
Printer Friendly | Permalink |  | Top
 
naaman fletcher Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Oct-01-10 05:01 PM
Response to Reply #6
7. ok then..
make all employees plug their USB drives into a virus checker whenever they enter the powerplant. Sounds like a pain in the rear, but much better than having to deal with this.
Printer Friendly | Permalink |  | Top
 
Poll_Blind Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Oct-01-10 05:21 PM
Response to Reply #7
8. Unfortunately the malware was signed with the authentic (stolen) digital signatures of at least...
...2 major companies, used a "root-kit" to hide itself undetectably from the operating system and used at least 4 "zero-day" (unknown) operating system exploits in order to spread itself. In this case, the USB scanner itself would have become unknowingly infected with the worm and passed it to all other USB drives subsequently plugged into it after the infected one.

It's...a very cleverly-written piece of software backed up by multiple real-world digital identity thefts and world-class operating system and hardware exploitation knowledge. What it does, how it knows what to do and how it does it is so exotic that such a thing was guessed at but required a dedicated nation-state with healthy access to large gobs of money and extremely talented folks from many different fields to create.

PB
Printer Friendly | Permalink |  | Top
 
naaman fletcher Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Oct-01-10 07:33 PM
Response to Reply #8
9. interesting,
didn't know that. thanks for the info.
Printer Friendly | Permalink |  | Top
 
hunter Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Oct-02-10 08:40 AM
Response to Reply #8
10. One of these days all our cars will go down.
The only vehicles left running will be old clunkers and classics without computers but they won't be able to go anywhere because the streets and highways will be clogged with inoperative vehicles.

Printer Friendly | Permalink |  | Top
 
CatholicEdHead Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Oct-02-10 10:51 AM
Response to Reply #7
11. Easier would just be disable all USB ports on internal computers
it can be done.
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Fri Apr 26th 2024, 03:21 PM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Latest Breaking News Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC