Paul B
Member
Related thread: http://www.plctalk.net/qanda/showthread.php?t=57361
Frankly, if Siemens gets a black eye for having easy to infect software then good. I know that Rockwell and Delta Computer Systems can't and wouldn't sell stuff to Iran and it pi$$e$ me off that Siemens would.
Damn....the next Christmas puzzle rumbled already
Is this another reference that the developers were using un-licensed software?The story shows how reliant Iran seems to be on Western software and equipment from firms such as Microsoft and Siemens, even if it may not always be a licensed user. That reliance on foreign equipment is itself a vulnerability, experts say.
Or, it could have been someone attempting to insure that they get paid in full?BUT WHO DID IT?
Asked if it might be the U.S., cybersecurity expert James Lewis at the Centre for Strategic and International Studies in Washington said: “It could be”.
“But how about the Israelis?” he continued. “They’re good. It could be the Brits. They’re good. It could be the Russians or the Chinese for some weird reason.”
U.S. Naval War College’s Reveron said it was possible it could have been done by a group outside a government.
“Symantec estimated that fewer than 10 people working over six months could have written it,” he said, referring to the respected tech security firm that initially tied the worm to an attack on Iran. “When it comes to cyber issues, governments trail behind private industry and nonstate actors.”