News:

PD.com: We have 73 Virgins!

Main Menu

Stuxnet: An actual Cyber attack weapon

Started by Triple Zero, September 22, 2010, 05:29:17 PM

Previous topic - Next topic

Nephew Twiddleton

Quote from: Charley Brown on September 22, 2010, 07:40:19 PM
Well, if it's an actual attack, I would look to Siemens competitors in the PLC market. Trying to sell their PLC's.

DEADFOO7 doesn't sound like an executable command but instead a diagnostic code.

Create a problem, give the solution.
Strange and Terrible Organ Laminator of Yesterday's Heavy Scene
Sentence or sentence fragment pending

Soy El Vaquero Peludo de Oro

TIM AM I, PRIMARY OF THE EXTRA-ATMOSPHERIC SIMIANS

Disco Pickle

haven't had a chance to dig through the thread yet as I'm up to my neck in work and just taking a quick break, but I just read an article in Rockwell Automation's trade journal about securing industrial computers and controllers from internal and external threats.  

Any factory worth its salt has a buffer zone in place that forces network traffic to originate or terminate within the network.  Of course, if access is gained to the enterprise network, and someone can get access to a program that's communicating to a computer within the buffer zone, then boom, they have access to an industrial computer that's driving plant equip.

Rockwell is working with Cisco and selling their own security approach, which stinks a bit to me, but then I've always had a suspicion that certain anti-virus companies fund virus creation in order to drive their market.

Not that Rockwell and Cisco necessarily would need to drive this extra market, but I wouldn't be surprised if Rockwell didn't develop technology of this sort internally or that it was derived from their own in house security testing teams.

I'll finish the thread later, but good subject.  It's something my own company may have to begin addressing if certain entities begin to demand stronger security requirements built into their switchgear and power control systems.
"Events in the past may be roughly divided into those which probably never happened and those which do not matter." --William Ralph Inge

"sometimes someone confesses a sin in order to take credit for it." -- John Von Neumann

Triple Zero

Quote from: Golden Applesauce on September 22, 2010, 06:46:51 PM
Quote
The appearance of Stuxnet created a ripple of amazement among computer security experts. Too large, too encrypted, too complex to be immediately understood, it employed amazing new tricks, like taking control of a computer system without the user taking any action or clicking any button other than inserting an infected memory stick. Experts say it took a massive expenditure of time, money, and software engineering talent to identify and exploit such vulnerabilities in industrial control software systems.

It employs the amazing new trick of requiring the victim to physically insert an infected memory stick?

We're screwed.

Heh, yeah. I was feeling kind of double about that quote too.

On the one hand it's a pretty powerful trick, if used right and if it goes undetected for a while. In some companies people plug their USBs in all over the place. An added benefit is that it can work completely quietly, and needs no tricky exploits to execute arbitrary code. Unlike, say, a Flash or Acrobat plugin exploit, which usually need to cause some crazy overflow in order to trip the OS into executing specially crafted code, often crashing something or make the system glitch.

Yet on the other hand, it's hardly new.

Another thing I wonder about is how it can specifically infect industrial control computers. Usually a virus just spreads as far and wide as it can.

Quote
foo is a standard generic name in computer science.  So I parse that filename as DEAD+FOO+7, not DEADF+007.

then it spells DEADFOOT? cause the 7 can be a T like in 31337.
Ex-Soviet Bloc Sexual Attack Swede of Tomorrow™
e-prime disclaimer: let it seem fairly unclear I understand the apparent subjectivity of the above statements. maybe.

INFORMATION SO POWERFUL, YOU ACTUALLY NEED LESS.

Triple Zero

Quote from: Charley Brown on September 22, 2010, 07:40:19 PM
Well, if it's an actual attack, I would look to Siemens competitors in the PLC market. Trying to sell their PLC's.

DEADFOO7 doesn't sound like an executable command but instead a diagnostic code.

0xDEADF007 is a hexadecimal number. 3735941127 in decimal.
Ex-Soviet Bloc Sexual Attack Swede of Tomorrow™
e-prime disclaimer: let it seem fairly unclear I understand the apparent subjectivity of the above statements. maybe.

INFORMATION SO POWERFUL, YOU ACTUALLY NEED LESS.

Golden Applesauce

#64
Quote from: Charley Brown on September 22, 2010, 07:40:19 PM
Well, if it's an actual attack, I would look to Siemens competitors in the PLC market. Trying to sell their PLC's.

If the US cyberdefense geeks haven't immediately cracked the virus, I see three possibilities:
1.)  They have the capability to do so, but haven't because either it was either of US Gov't origin or someone we don't want to dick over / get in a fight with publicly.
2.)  They've been trying to crack the virus and have so far failed to do so fully.  This restricts the country of origin to somewhere like Russia or China, who are somewhat ahead of us in the cyber race.  Maybe Israel?  Would they tell the US if they snuck an infected USB drive into Iranian power plants?
3.)  They have in fact cracked the virus, but aren't going to tell everyone (or at least the public) about it because by keeping the originator guessing they gain some national security advantage.

A PLC manufacturer that isn't Siemens probably doesn't have the expertise to pull this off.  Siemens itself probably doesn't have the expertise to pull this off - according to the wiki the attack involves numerous 0-day vulnerabilities in Windows, stolen security certificates, etc.

http://langner.com/en/ seems to have some information about this.  I like his Russian contractor point of infection theory.
Q: How regularly do you hire 8th graders?
A: We have hired a number of FORMER 8th graders.

Telarus

There are only 8 google hits for "pwn the means of production"......
Telarus, KSC,
.__.  Keeper of the Contradictory Cephalopod, Zenarchist Swordsman,
(0o)  Tender to the Edible Zen Garden, Ratcheting Metallic Sex Doll of The End Times,
/||\   Episkopos of the Amorphous Dreams Cabal

Join the Doll Underground! Experience the Phantasmagorical Safari!

Golden Applesauce

Quote from: Triple Zero on September 23, 2010, 01:59:09 AM
Quote from: Golden Applesauce on September 22, 2010, 06:46:51 PM
Quote
The appearance of Stuxnet created a ripple of amazement among computer security experts. Too large, too encrypted, too complex to be immediately understood, it employed amazing new tricks, like taking control of a computer system without the user taking any action or clicking any button other than inserting an infected memory stick. Experts say it took a massive expenditure of time, money, and software engineering talent to identify and exploit such vulnerabilities in industrial control software systems.

It employs the amazing new trick of requiring the victim to physically insert an infected memory stick?

We're screwed.

Heh, yeah. I was feeling kind of double about that quote too.

On the one hand it's a pretty powerful trick, if used right and if it goes undetected for a while. In some companies people plug their USBs in all over the place. An added benefit is that it can work completely quietly, and needs no tricky exploits to execute arbitrary code. Unlike, say, a Flash or Acrobat plugin exploit, which usually need to cause some crazy overflow in order to trip the OS into executing specially crafted code, often crashing something or make the system glitch.

Yet on the other hand, it's hardly new.

Another thing I wonder about is how it can specifically infect industrial control computers. Usually a virus just spreads as far and wide as it can.

The more I think about it, the more a USB attack makes total sense.  Any moron can isolate his plant from the outside web, but stopping USB drives either requires your plant to go completely removable-storage-less or to train all of your employees and all of your contractors against sticking untrusted drives into computers that control nuclear reactors.  What's sad is that the last bit is going to be harder to achieve.  (Especially if a foreign agent infiltrates your contractors.)

As for the specificity, if it were possible to restrict my viruses to only infecting relevant machines, I'd do it - the fewer machines infected, the lower your chances of detection.  If you're only after one plant, then getting extra computers after that benefits you nothing, and only risks your code getting found earlier.

GAs ultimate company-wide firewall:
1.  Find every computer that has access to the company local net.
2.  Chew lots of gum.
3.  Insert chewed gum into every orifice on that computer that can accept arbitrary data.
4.  Use keyboards and mice with the old-style connectors.
Q: How regularly do you hire 8th graders?
A: We have hired a number of FORMER 8th graders.

the last yatto

This kinda reminds me of the files Kevin found on Shimomura's computer.

The toolkit he created to test cities, powerplants are one step up the foodchain
Look, asshole:  Your 'incomprehensible' act, your word-salad, your pinealism...It BORES ME.  I've been incomprehensible for so long, I TEACH IT TO MBA CANDIDATES.  So if you simply MUST talk about your pineal gland or happy children dancing in the wildflowers, go talk to Roger, because he digs that kind of shit

Requia ☣

Quote from: Golden Applesauce on September 23, 2010, 05:02:19 AM
Quote from: Triple Zero on September 23, 2010, 01:59:09 AM
Quote from: Golden Applesauce on September 22, 2010, 06:46:51 PM
Quote
The appearance of Stuxnet created a ripple of amazement among computer security experts. Too large, too encrypted, too complex to be immediately understood, it employed amazing new tricks, like taking control of a computer system without the user taking any action or clicking any button other than inserting an infected memory stick. Experts say it took a massive expenditure of time, money, and software engineering talent to identify and exploit such vulnerabilities in industrial control software systems.

It employs the amazing new trick of requiring the victim to physically insert an infected memory stick?

We're screwed.

Heh, yeah. I was feeling kind of double about that quote too.

On the one hand it's a pretty powerful trick, if used right and if it goes undetected for a while. In some companies people plug their USBs in all over the place. An added benefit is that it can work completely quietly, and needs no tricky exploits to execute arbitrary code. Unlike, say, a Flash or Acrobat plugin exploit, which usually need to cause some crazy overflow in order to trip the OS into executing specially crafted code, often crashing something or make the system glitch.

Yet on the other hand, it's hardly new.

Another thing I wonder about is how it can specifically infect industrial control computers. Usually a virus just spreads as far and wide as it can.

The more I think about it, the more a USB attack makes total sense.  Any moron can isolate his plant from the outside web, but stopping USB drives either requires your plant to go completely removable-storage-less or to train all of your employees and all of your contractors against sticking untrusted drives into computers that control nuclear reactors.  What's sad is that the last bit is going to be harder to achieve.  (Especially if a foreign agent infiltrates your contractors.)

As for the specificity, if it were possible to restrict my viruses to only infecting relevant machines, I'd do it - the fewer machines infected, the lower your chances of detection.  If you're only after one plant, then getting extra computers after that benefits you nothing, and only risks your code getting found earlier.

GAs ultimate company-wide firewall:
1.  Find every computer that has access to the company local net.
2.  Chew lots of gum.
3.  Insert chewed gum into every orifice on that computer that can accept arbitrary data.
4.  Use keyboards and mice with the old-style connectors.

It's possible to turn those things off in BIOS, then password protect the BIOS.  (also get a motherboard that doesn't have a reset jumper).
Inflatable dolls are not recognized flotation devices.

Cain

There is virtually no dividing line between Israeli and US intelligence (or British and American intelligence for that matter) so they are obviously the main suspects.  The only other nations with sufficiently advanced cyberwarfare capabilities either don't involve themselves in the Middle East in that way (Japan, South Korea, Brazil) or are invested in keeping Iran working as well as possible (Russia, China)

Cain

And given the code isn't apparently as complex as many in the media are making it, it could even be rogue elements of the aforementioned collaborating with anti-Iranian hacktivists, of which there are plenty.

Triple Zero

I'd try sending one of the sysadmins a really good deal for company-branded ("empty") USB sticks.
Ex-Soviet Bloc Sexual Attack Swede of Tomorrow™
e-prime disclaimer: let it seem fairly unclear I understand the apparent subjectivity of the above statements. maybe.

INFORMATION SO POWERFUL, YOU ACTUALLY NEED LESS.

Doktor Howl

Am I the only one that is reminded of The Masque of the Red Death?
Molon Lube

Golden Applesauce

Quote from: Charley Brown on September 22, 2010, 07:30:32 PM
I don't know how much redundancy something like a nuclear plant would have, but I bet one failed PLC wouldn't do shit.

Once it gets on the local network it spreads to infect all of the PLCs.  Just replacing one PLC wouldn't do any good, because the program would just re-infect it.
Q: How regularly do you hire 8th graders?
A: We have hired a number of FORMER 8th graders.

bds

It seems stupid to me that nuclear computer systems aren't entirely closed. Nothing gets stuck in, nothing gets taken out. Gotta upgrade the system? Buy new computers. Or new hard drives, at least.