Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Computer super-virus 'targeted Iranian nuclear power station' but who made it?

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Archives » General Discussion (1/22-2007 thru 12/14/2010) Donate to DU
 
G_j Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Sep-24-10 10:15 PM
Original message
Computer super-virus 'targeted Iranian nuclear power station' but who made it?
http://www.dailymail.co.uk/sciencetech/article-1314580/Stuxnet-worm-targeted-Iranian-nuclear-power-station-sophisticated-virus-attack-ever.html

Computer super-virus 'targeted Iranian nuclear power station' but who made it?

By Niall Firth
24th September 2010

The world’s first cyber ‘super weapon’ may have been designed to attack a nuclear power station in Iran, experts believe.

A computer virus called Stuxnet has been described as the most sophisticated 'worm' ever created and has already infected more than 45,000 networks worldwide.

<snip>

Now internet security experts fear that Stuxnet, which was first detected in June, is the first 'worm' specifically created to target real-world infrastructure such as power stations and water plants.

And they say that it is so sophisticated that only a country with a high level of computer programming know-how would have been able to create it.

<snip>

It then launches an attack by reprogramming software to give any industrial machinery new, potentially dangerous, instructions.
Printer Friendly | Permalink |  | Top
Whoa_Nelly Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Sep-24-10 10:18 PM
Response to Original message
1. hmmmmm
The US? just a guess... :shrug:
Printer Friendly | Permalink |  | Top
 
tkmorris Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Sep-24-10 10:20 PM
Response to Reply #1
2. I have another guess...
But sadly, if I utter it, the thread will likely get moved then locked.
Printer Friendly | Permalink |  | Top
 
WannaJumpMyScooter Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Sep-24-10 10:50 PM
Response to Reply #2
4. yep, one of those "I" countries
funded by one of the "U" countries
Printer Friendly | Permalink |  | Top
 
boppers Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Sep-25-10 12:01 AM
Response to Reply #4
9. Iran does get help from the Ukraine, come to think of it.
:evilgrin:
Printer Friendly | Permalink |  | Top
 
johnfunk Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Sep-24-10 10:23 PM
Response to Original message
3. Sounds like something my 19-year-old nephew would do.
Printer Friendly | Permalink |  | Top
 
applegrove Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Sep-24-10 11:11 PM
Response to Original message
5. I wonder if Obama would call this 'soft power' or not. LOL!
Printer Friendly | Permalink |  | Top
 
AdHocSolver Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Sep-24-10 11:45 PM
Response to Original message
6. Some thoughts about this new computer "worm".
Some comments from that website pointed out that critical systems that run infrastructure should never be attached directly to the Internet.

The article pointed out that the infected PCs were running Microsoft software. Considering that Microsoft software is so buggy and insecure (there are tens of thousands of viruses and worms that can attack such PCs), no one in their right mind would use PCs running MS software to operate any critical systems.

Considering that the new "worm" attacked a system developed by the German company Siemens and was allegedly reverse-engineered by a German cyber-security researcher, one could postulate that the alleged "worm" is really just to cover up very badly written code in the system. Having worked many years as a programmer, in which I spent most of my time fixing other people's coding mistakes, this is the first thought that came to mind.

This other comment also alerted me to the idea that the "worm" may be a cover up for lousy, bug-ridden code:

"Mr Langer says that the sophistication of the virus means that only a ‘nation state’ could have developed it."

Any corporation that develops such software and had competent software engineers would be able to reverse engineer it and add the appropriate code. Langer's statement is nonsense.






Printer Friendly | Permalink |  | Top
 
G_j Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Sep-24-10 11:55 PM
Response to Reply #6
7. great input
appreciated
Printer Friendly | Permalink |  | Top
 
boppers Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Sep-25-10 12:03 AM
Response to Reply #6
10. +1
This is just Conficker redux, not some paradigm-shifting, unpredictable, advanced attack and control system.
Printer Friendly | Permalink |  | Top
 
TheMadMonk Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Sep-25-10 07:40 AM
Response to Reply #6
11. Isolation of critical systems. 100% agree. However,...
...(Damn can't believe I'm defending the great Satan here) your points about platform security are unwarranted.

Independent evaluations have on multiple occasions shown that other vendors are equally bad (or worse) as M$. M$ just gets more hacker attention (and subsequent bad press) because of simple ubiquity of target.

You're right, pointing the finger at nation states is crap. A script kiddie with a basic knowledge of utilities infrastructure could have done this quite easily.

Nation states may well be working on compromise software of this nature. However, I'd lay London to a housebrick that the vast majority of such efforts are never deployed, simply updated as each hole gets closed.

Like this they are minor annoyances. When used properly, (as intended) it won't be a nuke plant going down, it will be an entire country plunged into the 19th century.
Printer Friendly | Permalink |  | Top
 
Regret My New Name Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Sep-27-10 02:11 PM
Response to Reply #11
12. I think if a kid wrote it him/herself then he wouldn't be a script kiddie...
Just saying...
Printer Friendly | Permalink |  | Top
 
boppers Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Sep-24-10 11:59 PM
Response to Original message
8. Reporters: Not computer scientists.
Pieces of Stuxnet have been around for two years now (some, even longer), and were "discovered" by at least 2 companies, and one individual. No "country" needed.

For example:
http://www.computerworld.com/s/article/9187300/Microsoft_confirms_it_missed_Stuxnet_print_spooler_zero_day_

There's also Conficker code in it, for pete's sake, and it uses the same strategy as Conficker: Attack systems at a large number of weak points.
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Thu Apr 25th 2024, 05:08 PM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Archives » General Discussion (1/22-2007 thru 12/14/2010) Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC