O.T. Computer virus in Iran targets PLCs

It hit the swedish papers today.
Haha fun to read that the journalists have no clue what it does or what it targets, the article only says it targets plants "computer system" :rolleyes:
 
Frankly, if Siemens gets a black eye for having easy to infect software then good. I know that Rockwell and Delta Computer Systems can't and wouldn't sell stuff to Iran and it pi$$e$ me off that Siemens would.

I dont think it is sold directly by Siemens. There is no reason why those purchases would have not been trough Russia as Russians were helping Iran with reactors.
 
Is the complete injected PLC code availible somewhere?

According to Symantec there are several FCs with code that the virus infects the PLCs with I would like to se that code..
 
The news around here is that "only" someone with "lots" of money and a "team" of programmers, or a "government" would be able to write such a "sophisticated" virus. Just another example of how clueless and inept the news media has become. IM(NS)HO
 
Last edited:
A virus writing code for a PLC? We could all be out of a job if someone can just code a virus that writes everything we want on purpose. :unsure:
 
The story shows how reliant Iran seems to be on Western software and equipment from firms such as Microsoft and Siemens, even if it may not always be a licensed user. That reliance on foreign equipment is itself a vulnerability, experts say.
Is this another reference that the developers were using un-licensed software?
--------------------------------------
BUT WHO DID IT?
Asked if it might be the U.S., cybersecurity expert James Lewis at the Centre for Strategic and International Studies in Washington said: “It could be”.
“But how about the Israelis?” he continued. “They’re good. It could be the Brits. They’re good. It could be the Russians or the Chinese for some weird reason.”
U.S. Naval War College’s Reveron said it was possible it could have been done by a group outside a government.
“Symantec estimated that fewer than 10 people working over six months could have written it,” he said, referring to the respected tech security firm that initially tied the worm to an attack on Iran. “When it comes to cyber issues, governments trail behind private industry and nonstate actors.”
Or, it could have been someone attempting to insure that they get paid in full?
 
I'm taking a contrarian view on this one. It does feel like a group, not necessary a government sponsored one, did this. Your typical virus kiddi tend not to spend effort on control system, and judging from the finding so far, a specific control system, together with stolen security certificate and decent knowledge of the PLC/HMI.

The HMI screen capture looks more like some type of refining facility to me...
 

Similar Topics

Has anyone installed Hp laserjet pro 4203 to OMNI 3000 or 6000 via ethernet..Is there a specific Config? I have a problem..Please advise
Replies
0
Views
73
A project recently went through to replace an old computer that was running Wonderware with a new computer. After a bit of work I was able to get...
Replies
7
Views
481
I would like to temporarily install AdvancedHMI on the same computer as FactoryTalk View SE. I am waiting for another contractor to finish the FTV...
Replies
3
Views
580
My customer wants me to set up their industrial computer hmi running factory talk view se client in the following way. They want to use a single...
Replies
11
Views
1,050
Hi everyone. Ifix scada is new for me. Please help help me to clarify is it possible to open Ifix scada runtime on dual monitor and how to do? Thanks
Replies
1
Views
473
Back
Top Bottom