Son of Stuxnet

Who knows -- the world's only known about it for an hour...

The moral of the story (whatever the story is) is to make sure your industrial systems are properly protected. Especially if they're attached to the outside world.

Stuxnet was primarily targeted at Siemens - is duqu? But, I'm also not aware of any stuxnet "attacks" that weren't very specifically targeted.
 
I know nothing, but thanks for posting the link. My fear is that Duqu is a "revenge" worm.
 
http://www.eweek.com/c/a/Security/R...ly-Discovered-Duqu-Worm-is-Stuxnet-20-594465/

It looks like someone is trying to re-purpose Stuxnet, according to the article I linked. Lancie I don't know if it's a revenge thing, or if it's someone digging for proprietary info on control systems. Symantec thinks that the virus is targeting control system manufacturers. There was another thread where it was suggested that something like this was a possibility, but I gotta wonder how well it's going to work: Stuxnet was a precision tool, Duqu seems to be less precise.
 
http://www.bbc.co.uk/news/technology-15367816

A better, more informative article from the beeb. The last paragraph is kind of interesting. Some of us discussed that very idea in this thread:

http://www.plctalk.net/qanda/showthread.php?t=64887
We pondered the idea of Anonymous doing it "for teh lulz" or doing it as part of a larger agenda, but kind of decided that they probably wouldn't bother. But DoHS says they might be trying to target control systems, is that because DoHS has found credible evidence, or is it because they don't understand these kids and their newfangled internets? To say that I'm underwhelmed with the government's apparent knowledge when it comes to anything computer related is putting it very mildly. Or, another way to look at it, considering that Stuxnet might be an American product, would be to say that there is a small minority who know what they are doing, and a vast wasteland of idiots I wouldn't trust with a melon baller?
 
A lot of speculation by the "reporters" here, I suggest that you read the Symantec and McAfee reports to get the facts, even there it may not be obvious to determine fact from speculation.
From Symantec:
Duqu shares a great deal of code with Stuxnet; however, the payload is completely different. Instead of a payload designed to sabotage an industrial control system, the payload has been replaced with general remote access capabilities. The creators of Duqu had access to the source code of Stuxnet, not just the Stuxnet binaries. The attackers intend to use this capability to gather intelligence from a private entity to aid future attacks on a third party.(Speculation) While suspected, no similar precursor files have been recovered that predate the Stuxnet attacks.
Regardless it is interesting to watch from a distance and eye opening when the possibilities are thought through.
Plus the "speculations" on who is doing this?
 
Thanks Russ. I noticed a lot of speculation myself, and wondered how they were coming to those conclusions. As to who's doing it, Symantec thinks that whoever is doing it has the source code for Stuxnet, which was, as far as I know, never released. My guess, if that is true, is that whoever wrote stuxnet in the first place might be gearing up to do something else? This raises the possibility that Symantec and McAfee may have disrupted an American or Israeli operation of some sort. If that's the case, though, it's difficult to feel sympathetic, considering that everyone has their eyes out for another Stuxnet-like event.
 
Good link. Thanks for the information.

Presumably someone could 'reverse engineer' Stuxnet to get at the source code??

Like using the old WinDASM (windows disassembler) as it was...?

One thing is for sure... this will be the first of many variants.
 

Similar Topics

Hey guys, hoping someone here could give me a little advice. I'm working with a CR1000-04000 in Crimson 3.1 and I was interested in adding the...
Replies
4
Views
77
Hi, I'm having an issue in crimson 3.0 when I create a programme using a case statement referencing a fault word that each bit needs to change the...
Replies
1
Views
76
How do you install update on Red Lion Crimson ver 3.1. Do I just need to run the exe file on the host server?
Replies
1
Views
101
I've posted this on the ptc forum as well, but no luck with an answer (waiting for my service contract number) I keep getting the following error...
Replies
2
Views
103
Has anyone found a way to convert/replace/update the firmware on old Parker TS80xx series HMIs (i.e. TS8010, TS8006, etc) to accept Crimson...
Replies
0
Views
86
Back
Top Bottom