« POPE Home | Email msg. | Reply to msg. | Post new | Board info. Previous | Home | Next

Re: Duh? 

By: Decomposed in POPE | Recommend this post (1)
Tue, 12 Jun 12 9:02 PM | 77 view(s)
Boardmark this board | (The) Pope's for real stock market report
Msg. 60798 of 65535
(This msg. is a reply to 60779 by DGpeddler)

Jump:
Jump to board:
Jump to msg. #

re: "Windows DID it."

I'm not sure what you mean by that, DGpeddler, but it sounds like you ascribe the blame to Microsoft.

Stuxnet incorporated not one, but three, zero-day vulnerabilities. That is, it took advantage of three system flaws that no one in the world had previously known. Obviously, there were no patches or antivirus signatures to guard against them. They were unknown, even to the manufacturers/developers of the products. And although Stuxnet ran on Windows, the vulnerabilities it exploited were not all Microsoft's.

When a company markets software internationally, most countries require the company to provide the code prior to granting it permission to sell the product. The governments then go about analyzing the code, looking for anything that might be a concern, but also identifying vulnerabilities which they typically keep to themselves.

Such zero-day vulnerabilities are rare gems. Stuxnet had three.

Rogue hackers could never have implemented it. They don't have access to the product code. From that alone, it is clear that Stuxnet was the work of one or more nations, not individuals, confederations or companies.

Whoever designed Stuxnet had an OUTSTANDING understanding of the Bushehr nuclear power plant, its layout, its construction, its security, its people, and the automated systems within. They built the first product to ever attack programmable logic controllers, the Siemens mechanisms that regulate industrial hardware, ensuring that the hardware operates within specified boundaries.

It's said that the attackers had to have understood the Iranian facility better than the Iranians themselves - which is actually possible since the facility was built with extensive foreign assistance, and stocked with foreign technology.

Finally, whoever was behind Stuxnet compromised Verisign digital certficates for TWO high tech companies far removed from Iran. No hacker could have pulled that off. In fact, the compromises almost had to have involved breakins at Verisign itself, altering Verisign's records so that the certificates would give Bushehr the 'thumbs up' to communicate with the Command and Control servers from which Stuxnet received guidance and delivered findings.

Could one company (Microsoft) have been behind such an attack? Not a chance. Stuxnet went far beyond the resources available to Microsoft. It is not even likely that Israel or the United States could have been behind it. Not by themselves. Stuxnet was probably a coordinated effort by several determined governments.




Avatar

Gold is $1,581/oz today. When it hits $2,000, it will be up 26.5%. Let's see how long that takes. - De 3/11/2013 - ANSWER: 7 Years, 5 Months


- - - - -
View Replies (1) »



» You can also:
- - - - -
The above is a reply to the following message:
Re: Duh?
By: DGpeddler
in POPE
Tue, 12 Jun 12 6:47 PM
Msg. 60779 of 65535

Windows DID it.

"The Windows flaw was unknown before Stuxnet's discovery in 2010, according to Roel Schouwenberg, one of the Kaspersky Lab researchers who helped discover the Flame virus.

Kaspersky Lab researchers did not find the Flame components in more advanced versions of Stuxnet, added Schouwenberg.

"Flame was used as some sort of a kick-starter to get the Stuxnet project going," Schouwenberg theorized. "As soon as the Stuxnet team had their code ready, they went their way."

He suspected the creators of Stuxnet removed the borrowed components from later versions so the Flame program would not be compromised if the attack on the Iranian nuclear program was discovered.

Stuxnet was discovered in 2010 and has been closely scrutinized by the world's smartest cyber sleuths. Yet Flame remained hidden until last month, when a United Nations agency asked Kaspersky Lab to look for a virus that Iran said had sabotaged its computers, deleting valuable data.

When Kaspersky's team started looking for suspicious files in the Middle East, they found Flame.

Eugene Kaspersky said at the Reuters Summit his firm recently agreed to advise on geopolitical Internet security issues more broadly for the U.N.'s International Telecommunication Union. Russia and others want the group to take a more active role in Internet governance.

Schouwenberg said he suspected Flame may be capable of deleting data and attacking industrial control systems that run plants like the uranium enrichment facility at Natanz, but he has yet to find the evidence.

Kaspersky Lab researchers are still trying to understand the function of more than 100 mysterious files built into the Flame samples that they have discovered, he said."

http://www.reuters.com/article/2012/06/12/us-media-tech-summit-flame-idUSBRE85A0TN20120612


« POPE Home | Email msg. | Reply to msg. | Post new | Board info. Previous | Home | Next