Can a virus attack your plc?

It was a Siemens issue not Rockwell

My only suggestion is for you to maybe do a bit more research on the stuxnet. There is way too much information to answer you in a one line reply.

Your desire to answer a different question to the one I asked notwithstanding, I did the research THANKS.

Now, let's go third time's the charm.... would they (and we can't say who they are because that would be racist) need to write a virus and use rare exploits and all that other nonsense to get the Stuxnet payload into Rockwell software? (which we can't say where that software is from because that would be racist)
Or is that payload built right into the software directly, maybe Edward Snowden has the answer.
 
Nah, easier to look at how the software/communication works so you can fully customize your virus. Building it into the standard software, your powers are limited because you are dependant on the software developer.
Much better to get a virus that use rare exploits and mimic 'official' software.

But the obvious reason would be that should you integrate the virus into the main software package, you'd lose just about all your customers once it gets out that your software polls a baseball site for updates......

We all know who's behind it.
And we know they're currently working on a next version.
Don't think they'll use it right away, but they'd be more likely to want something for when they need it. Don't doubt they have similar ones for just about every major manufacturer.
 
Yeah maybe. I just think that the "Your country needs you" speech is easier*. Especially as we now know that many very VERY large companies complied with requests for unfettered access to systems and servers already, there is no reason to assume that any other software house could resist the might (read: inherent threats) of the those who are allowed to break their own country's laws without fear of penalty.

*although those software skills, maybe even Stuxnet itself, was more of a training exercise than a tactical deployment, it certainly achieved very little and they could not possibly have envisaged it would be anything more than a minor setback in capability and a major setback in trust.
 
...although those software skills, maybe even Stuxnet itself, was more of a training exercise than a tactical deployment, it certainly achieved very little ...
It appears that it delayed the deployment of bombers, missles, and boots on the ground in Iran until about 2015. What Stuxnet achieved was more that all the negotiation talks and trading blockades have ever done.
 

Similar Topics

Salve ragazzi... questa volta non so proprio da dove iniziare... ho bisogno di un immensa mano.ù volevo sapere cosa si deve fare per risanare il...
Replies
4
Views
2,676
I had an old boss reach out to me last night. He mentioned that their system had a huge virus that did all kinds of damage to their servers. They...
Replies
16
Views
4,187
Good Afternoon, Every 2 months we have a county wide Manufacturing Roundtable at a local college , but now it’s a Zoom conference now . We...
Replies
17
Views
5,657
Had an issue that started last Friday where my Anti-Virus software, AVG, got updated, and since then Rockwell software activations have ceased to...
Replies
23
Views
7,665
Here's another puzzle to take your mind off the current situation. Attached is some structured text that flashes the variable 'Flash'. A small...
Replies
2
Views
2,266
Back
Top Bottom