SUBSIM Radio Room Forums



SUBSIM: The Web's #1 resource for all submarine & naval simulations since 1997

Go Back   SUBSIM Radio Room Forums > General > General Topics
Forget password? Reset here

Reply
 
Thread Tools Display Modes
Old 09-22-10, 06:28 AM   #1
Skybird
Soaring
 
Skybird's Avatar
 
Join Date: Sep 2001
Location: the mental asylum named Germany
Posts: 42,604
Downloads: 10
Uploads: 0


Default Digital first strike

Here are two links two articles about stuxnet - and how it now is believed to be a massive digital attack in order to strike out at the Iranian nuclear weapons program. It is thoght that in early 2009 this trojan attack was responsible for the reduction of operational centrigues in Iran although at that time the Iranians installed more and more of such centrifuges. It is also said that such a highly cojmplex trojan cannot be just the tool of some hobby criminal, but must be formed and used with the ressources that only national states have.

The better, very detailed essay is the German one, for which I was not able to find an English equivalent somewehre. The second and third English links are just a brief summary of some features of the story. If you have a good essay on it, add it to the list. Please note that the conclusions are no Iranian propagandistic conspiracy theory, but are the results of examinations by professional German digital security experts and -analysts.

http://www.faz.net/s/RubCEB3712D41B64C3094E31BDC1446D18E/Doc~E8A0D43832567452FBDEE07AF579E893C~ATpl~Ecommon ~Scontent.html

http://www.daemonnews.org/2010/09/21...n-nuclear.html

http://planet-iran.com/index.php/news/24138

Quote:
Originally Posted by FAZ
„So etwas bauen große Staaten zusammen, wenn die Alternative bei einem Misserfolg wäre, einen Krieg anzufangen.“
"Stuff like that (struxnet) gets built by national states if the only alternative would be to start a war."
__________________
If you feel nuts, consult an expert.
Skybird is offline   Reply With Quote
Old 09-23-10, 09:23 AM   #2
Skybird
Soaring
 
Skybird's Avatar
 
Join Date: Sep 2001
Location: the mental asylum named Germany
Posts: 42,604
Downloads: 10
Uploads: 0


Default

BBC now has a longer essay in English, too.

http://www.bbc.co.uk/news/technology-11388018
__________________
If you feel nuts, consult an expert.
Skybird is offline   Reply With Quote
Old 01-16-11, 09:14 AM   #3
Skybird
Soaring
 
Skybird's Avatar
 
Join Date: Sep 2001
Location: the mental asylum named Germany
Posts: 42,604
Downloads: 10
Uploads: 0


Default

The plot is thickening. It already was said that Stuxnet'S developement was beyond the financial reach of just any private hacker organisation, and that background knowledge on the installations was needed that a hacker would not have if not being a specialist for the attacked installations himself.

The NYT now reports that Stuxnet is a cooperation between the two most likely suspects, Israel and the US, and that Israel tested the software, which is said to have been incredibly complex and clever, in an installation where they have copied the to-be-attacked hardware of the Iranian installations.

http://www.nytimes.com/2011/01/16/wo...16stuxnet.html

I admit I somewhat admire the competence level being shown in the design and developement of this cyber-weapon.

Edit: it seems the Times blocks access to the site somehow. Enter this search term at Google:


Israeli Test on Worm Called Crucial in Iran Nuclear Delay

Then find one of the first entries that is on the NYT website. This workaround works fo me. You should get an article with that healdine and 4 pages
__________________
If you feel nuts, consult an expert.

Last edited by Skybird; 01-16-11 at 07:51 PM.
Skybird is offline   Reply With Quote
Old 01-16-11, 09:27 AM   #4
the_tyrant
Admiral
 
Join Date: Jun 2010
Location: Canada
Posts: 2,272
Downloads: 58
Uploads: 0
Default

you know, John Boyd in The Strategic Game of ? and ? says that there are 3 levels of conflict:
physical, mental, and moral

we can use computers in the mental and moral parts of conflict, but now with this virus, computers are also useful in the physical part too

I have a feeling that pearl harbor 2.0 would be JSDF hackers attacking us navy computers and detonating weapons before they are launched, followed up by injecting malware in the firmware upgrades of american fire control systems
__________________
My own open source project on Sourceforge
OTP.net KGB grade encryption for the rest of us
the_tyrant is offline   Reply With Quote
Old 01-16-11, 11:58 AM   #5
TLAM Strike
Navy Seal
 
Join Date: Apr 2002
Location: Rochester, New York
Posts: 8,633
Downloads: 29
Uploads: 6


Default

Quote:
Originally Posted by the_tyrant View Post
I have a feeling that pearl harbor 2.0 would be JSDF hackers attacking us navy computers and detonating weapons before they are launched, followed up by injecting malware in the firmware upgrades of american fire control systems
That kind of stuff is really easy to prevent. Software updates by disk only hard coded in to our computer systems. Then guard those disks like the launch codes. It would slow down response time to problems but it would practically remove a problem at the same time.

A few years ago they banned USB drives from the Pentagon because that was how Chinese made viruses were getting in. (That is also how Suxnet got in) That was a step in the right direction.

(BTW I doubt it would be JSDF guys doing it)
__________________


TLAM Strike is offline   Reply With Quote
Old 01-16-11, 01:38 PM   #6
Skybird
Soaring
 
Skybird's Avatar
 
Join Date: Sep 2001
Location: the mental asylum named Germany
Posts: 42,604
Downloads: 10
Uploads: 0


Default

The updates you store on your precious discs, get created in some place. And that is the attack target, that is how I would take aim. Which makes the discs themselves already being infested. Also, there is the human factor. You will always have individuals who are prone to enemy blackmailing, and persuasions.
__________________
If you feel nuts, consult an expert.
Skybird is offline   Reply With Quote
Old 01-16-11, 02:16 PM   #7
TLAM Strike
Navy Seal
 
Join Date: Apr 2002
Location: Rochester, New York
Posts: 8,633
Downloads: 29
Uploads: 6


Default

Quote:
Originally Posted by Skybird View Post
The updates you store on your precious discs, get created in some place. And that is the attack target, that is how I would take aim. Which makes the discs themselves already being infested. Also, there is the human factor. You will always have individuals who are prone to enemy blackmailing, and persuasions.
Again simple countermeasures...

Facilities to code new patches are not linked to the outside world. Personnel are searched for items such as thumb drives and CDs and have those confiscated and checked.

All software engineers work in randomly assigned pairs each day, each software engineer has access to each others code to insure one is not adding malicious code to the patch.

Patch disks are formatted and burned in triple redundancy on separate systems then sealed in their shipping box before leaving the facility. Before installation the disks are checked for consistency between the three.
__________________


TLAM Strike is offline   Reply With Quote
Old 01-16-11, 02:52 PM   #8
the_tyrant
Admiral
 
Join Date: Jun 2010
Location: Canada
Posts: 2,272
Downloads: 58
Uploads: 0
Default

Quote:
Originally Posted by TLAM Strike View Post
Again simple countermeasures...

Facilities to code new patches are not linked to the outside world. Personnel are searched for items such as thumb drives and CDs and have those confiscated and checked.

All software engineers work in randomly assigned pairs each day, each software engineer has access to each others code to insure one is not adding malicious code to the patch.

Patch disks are formatted and burned in triple redundancy on separate systems then sealed in their shipping box before leaving the facility. Before installation the disks are checked for consistency between the three.
you just gave me an idea!
its quite possible that it was a mossad agent plugging in the usb drive in the first place
__________________
My own open source project on Sourceforge
OTP.net KGB grade encryption for the rest of us
the_tyrant is offline   Reply With Quote
Old 01-16-11, 02:59 PM   #9
TLAM Strike
Navy Seal
 
Join Date: Apr 2002
Location: Rochester, New York
Posts: 8,633
Downloads: 29
Uploads: 6


Default

Quote:
Originally Posted by the_tyrant View Post
you just gave me an idea!
its quite possible that it was a mossad agent plugging in the usb drive in the first place
I heard rumors that it was a Russian worker bribed in to doing it at one of the sites in Iran under construction.
__________________


TLAM Strike is offline   Reply With Quote
Old 01-16-11, 08:21 PM   #10
CaptainHaplo
Silent Hunter
 
CaptainHaplo's Avatar
 
Join Date: Apr 2007
Posts: 4,404
Downloads: 29
Uploads: 0
TLAM - just out of curiosity - do you have your CISSP cert?

Because you think like one. Most network security folks concentrate on the backbone - few remember physical access as one of the biggest "open doors".
__________________
Good Hunting!

Captain Haplo
CaptainHaplo is offline   Reply With Quote
Old 01-16-11, 08:38 PM   #11
the_tyrant
Admiral
 
Join Date: Jun 2010
Location: Canada
Posts: 2,272
Downloads: 58
Uploads: 0
Default

Quote:
Originally Posted by CaptainHaplo View Post
Most network security folks concentrate on the backbone - few remember physical access as one of the biggest "open doors".
i suppose its getting better
in my comptia security + plus guide there is a whole chapter on the subject
and in my CEH exam guide there is a chapter on it (I haven't taken the test though)
__________________
My own open source project on Sourceforge
OTP.net KGB grade encryption for the rest of us
the_tyrant is offline   Reply With Quote
Old 01-16-11, 09:19 PM   #12
TLAM Strike
Navy Seal
 
Join Date: Apr 2002
Location: Rochester, New York
Posts: 8,633
Downloads: 29
Uploads: 6


Default

Quote:
Originally Posted by CaptainHaplo View Post
TLAM - just out of curiosity - do you have your CISSP cert?

Because you think like one. Most network security folks concentrate on the backbone - few remember physical access as one of the biggest "open doors".
No I don't.

I'm not even in that field of study.
__________________


TLAM Strike is offline   Reply With Quote
Old 01-16-11, 09:35 PM   #13
Gargamel
Lucky Sailor
 
Join Date: Oct 2010
Location: Rome
Posts: 4,273
Downloads: 81
Uploads: 0
Default

Quote:
Originally Posted by TLAM Strike View Post
No I don't.

I'm not even in that field of study.
Sometimes outsiders have the best point of view. Forest for the trees sort of thing.
__________________
Luck is a residue of Design.


Gargamel is offline   Reply With Quote
Old 01-19-11, 09:19 AM   #14
Skybird
Soaring
 
Skybird's Avatar
 
Join Date: Sep 2001
Location: the mental asylum named Germany
Posts: 42,604
Downloads: 10
Uploads: 0


Default

Russians warn that Stuxnet may have damaged Busher, too, causing a risk of turning it into a second Chernobyl if it enters service.

http://www.telegraph.co.uk/news/worl...Chernobyl.html
__________________
If you feel nuts, consult an expert.
Skybird is offline   Reply With Quote
Reply


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump


All times are GMT -5. The time now is 09:36 PM.


Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
Copyright © 1995- 2025 Subsim®
"Subsim" is a registered trademark, all rights reserved.