Go Back  Airline Pilot Central Forums > Pilot Lounge > Hangar Talk
STUXNET, rootkits and other nasties... >

STUXNET, rootkits and other nasties...

Search

Notices
Hangar Talk For non-aviation-related discussion and aviation threads that don't belong elsewhere

STUXNET, rootkits and other nasties...

Thread Tools
 
Search this Thread
 
Old 05-24-2012, 04:02 AM
  #11  
Gets Weekends Off
 
UASIT's Avatar
 
Joined APC: Jun 2010
Posts: 333
Default

Waiting for 0x10 ͨ

Looks like a good pay to pass the days in the sandbox on deployments...
UASIT is offline  
Old 05-24-2012, 06:25 AM
  #12  
Gets Weekends Off
 
Singlecoil's Avatar
 
Joined APC: Jan 2010
Position: Supine
Posts: 257
Default

Originally Posted by FlightGear

Note: Stuxnet wasn't discovered, it was revealed.
It was discovered by the people the Iranians hired to figure out why their centrifuges were malfunctioning.
From the wikipedia article:
The worm was at first identified by the security company VirusBlokAda in mid-June 2010.[7] Journalist Brian Krebs's 15 July 2010 blog posting was the first widely read report on the worm.[22][23] Its name is derived from some keywords discovered in the software.[24][8]
Singlecoil is offline  
Old 05-24-2012, 05:17 PM
  #13  
Gets Weekends Off
Thread Starter
 
FlightGear's Avatar
 
Joined APC: Nov 2010
Position: Journo by night, irrigator by day
Posts: 220
Default

Originally Posted by UASIT
Thanks for the reminder...I had Siri make a note of it for me...:-)

I had to know.. you know, for larfs and giggles. skyvi had no probs setting a google calander event for 4 December 292,277,026,596. Even asked if I wanted a 1 day, 1week, 1 month reminder.lol
FlightGear is offline  
Old 05-24-2012, 07:25 PM
  #14  
Gets Weekends Off
Thread Starter
 
FlightGear's Avatar
 
Joined APC: Nov 2010
Position: Journo by night, irrigator by day
Posts: 220
Default

Originally Posted by Singlecoil
It was discovered by the people the Iranians hired to figure out why their centrifuges were malfunctioning.
From the wikipedia article:
The worm was at first identified by the security company VirusBlokAda in mid-June 2010.[7] Journalist Brian Krebs's 15 July 2010 blog posting was the first widely read report on the worm.[22][23] Its name is derived from some keywords discovered in the software.[24][8]
Stuxnet is thought to originate [infection zero] somewhere in '07. Everything is speculation, that said I think the dynamic of the attack and the nature of the target makes me put on my Sun Tzu glasses.. As opposed to the 'check list' linear glasses normally worn for computer problems. And I re-iterate; all that is known is that the original machine was WinCC capable. In all honesty my comments about Microsoft was my bias and my bad, sorry. Unix-like OS's have windows emulators, like WinE. In fact , given the relation WinCC has to the C language, and the fact that C is native to *nix its more than likely stux was written and compiled on a linux machine.. if odds are on, if Murphy is real..

So what Symantec actually 'discovered' was the 'smoking gun' that fired the magic digital payload.

Last edited by FlightGear; 05-24-2012 at 07:41 PM. Reason: .. In fact,..
FlightGear is offline  
Old 06-01-2012, 08:02 PM
  #15  
Gets Weekends Off
Thread Starter
 
FlightGear's Avatar
 
Joined APC: Nov 2010
Position: Journo by night, irrigator by day
Posts: 220
Default Barack Obama behind Stuxnet virus

Just in:

Stux to be you: Barack Obama behind Stuxnet virus - report | Information, Gadgets, Mobile Phones News & Reviews | News.com.au
FlightGear is offline  
Old 06-02-2012, 03:53 AM
  #16  
China Visa Applicant
 
Joined APC: Oct 2006
Position: Midfield downwind
Posts: 1,928
Default

The full NY Times article that originally broke the story is surprisingly revealing:

http://www.nytimes.com/2012/06/01/wo...er=rss&emc=rss
Hacker15e is offline  
Old 06-02-2012, 07:48 AM
  #17  
Gets Weekends Off
 
UASIT's Avatar
 
Joined APC: Jun 2010
Posts: 333
Default

Yeap...Read it yesterday...
UASIT is offline  
Old 06-02-2012, 07:52 AM
  #18  
Gets Weekends Off
Thread Starter
 
FlightGear's Avatar
 
Joined APC: Nov 2010
Position: Journo by night, irrigator by day
Posts: 220
Default

Who am I, gonzo, to contradict the 'Old Grey Lady'. There are some sound facts and interesting information. It seems to be written pretty 'fairly'. Even solid publications obey the first law of domestication; don't bite the hand that feeds you, when it comes to the current administration. The BBC is proof of this. I will wait a few days and see what tripe murdoch [he doesn deserve capitols or corct splg] feeds us and will probably find the truth is neither... or some-ware in between as communications professionals would say.

Occums Razor! Consider this. There is a 'person zero'. He/She [prol he] ignored basic IT external bus protocol. From this point on everything is logged and verifyable. Everything beyond this is speculation... But.

Imagine if the day before this happened Iran Google searched "Microsoft+Windows+security+venerability" Worried by the search returns Iran isolates its secure assets immediately and switches to a more robust operating system..... I would love to have a Lone Star with G.W. Jr. ans listen to his side.

Another view, from the lovely lady hassling me over my shoulder..... Capitalism. Not only did it make do a great deed for humanity, some may say, but it also made redundant a whole generation of chip-sets for secure applications. I have a UHF/VHF tranciever, made by the Chinese, capable of picking up the ISS. It cost $150. Units with these specs were a thousand bucks five years ago. This is 100% thanks to the wholesale abundance and adoption of certain styles of programmable logic chips. It has nothing to do with cheap labor as most hipsters[tm] will have us believe. Now 'MIL spec' becomes professional. Pro becomes consumer and pre 2010 consumer gear becomes landfill... and life goes on


The 'rootkit' developed by Olympic known as Stuxnet gave its initial developers a once strike only weapon aimed at one target once. The fact that rootkits that exploit the same venerability have been successfully deployed since Stuxnet shows us just how far Irans nuclear reality actually is. Ironically had Iran signed up for a legal nuclear power program your IAEA would have warned them about these chips. This is Hunter S. Thompson's Third law of gonzo-dynamics.

1- treat every firearm like it is loaded.

2- believe none of what you hear and half of what you see.

3- never trust a man that says native code is a good thing.
FlightGear is offline  
Old 06-02-2012, 07:53 AM
  #19  
Gets Weekends Off
 
UASIT's Avatar
 
Joined APC: Jun 2010
Posts: 333
Default

Meet 'Flame,' The Massive Spy Malware Infiltrating Iranian Computers | Threat Level | Wired.com
UASIT is offline  
Old 06-02-2012, 07:55 AM
  #20  
Gets Weekends Off
Thread Starter
 
FlightGear's Avatar
 
Joined APC: Nov 2010
Position: Journo by night, irrigator by day
Posts: 220
Default

lol:
'Flame': Lethal Cyberweapon or Media Hype? | PCWorld Business Center
FlightGear is offline  

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On



Your Privacy Choices