STUXNET, rootkits and other nasties...
#11
Waiting for 0x10 ͨ
Looks like a good pay to pass the days in the sandbox on deployments...
Looks like a good pay to pass the days in the sandbox on deployments...
#12
It was discovered by the people the Iranians hired to figure out why their centrifuges were malfunctioning.
From the wikipedia article:
The worm was at first identified by the security company VirusBlokAda in mid-June 2010.[7] Journalist Brian Krebs's 15 July 2010 blog posting was the first widely read report on the worm.[22][23] Its name is derived from some keywords discovered in the software.[24][8]
From the wikipedia article:
The worm was at first identified by the security company VirusBlokAda in mid-June 2010.[7] Journalist Brian Krebs's 15 July 2010 blog posting was the first widely read report on the worm.[22][23] Its name is derived from some keywords discovered in the software.[24][8]
#13
Gets Weekends Off
Thread Starter
Joined APC: Nov 2010
Position: Journo by night, irrigator by day
Posts: 220
#14
Gets Weekends Off
Thread Starter
Joined APC: Nov 2010
Position: Journo by night, irrigator by day
Posts: 220
It was discovered by the people the Iranians hired to figure out why their centrifuges were malfunctioning.
From the wikipedia article:
The worm was at first identified by the security company VirusBlokAda in mid-June 2010.[7] Journalist Brian Krebs's 15 July 2010 blog posting was the first widely read report on the worm.[22][23] Its name is derived from some keywords discovered in the software.[24][8]
From the wikipedia article:
The worm was at first identified by the security company VirusBlokAda in mid-June 2010.[7] Journalist Brian Krebs's 15 July 2010 blog posting was the first widely read report on the worm.[22][23] Its name is derived from some keywords discovered in the software.[24][8]
So what Symantec actually 'discovered' was the 'smoking gun' that fired the magic digital payload.
Last edited by FlightGear; 05-24-2012 at 07:41 PM. Reason: .. In fact,..
#15
Gets Weekends Off
Thread Starter
Joined APC: Nov 2010
Position: Journo by night, irrigator by day
Posts: 220
Barack Obama behind Stuxnet virus
#16
China Visa Applicant
Joined APC: Oct 2006
Position: Midfield downwind
Posts: 1,928
The full NY Times article that originally broke the story is surprisingly revealing:
http://www.nytimes.com/2012/06/01/wo...er=rss&emc=rss
http://www.nytimes.com/2012/06/01/wo...er=rss&emc=rss
#18
Gets Weekends Off
Thread Starter
Joined APC: Nov 2010
Position: Journo by night, irrigator by day
Posts: 220
Who am I, gonzo, to contradict the 'Old Grey Lady'. There are some sound facts and interesting information. It seems to be written pretty 'fairly'. Even solid publications obey the first law of domestication; don't bite the hand that feeds you, when it comes to the current administration. The BBC is proof of this. I will wait a few days and see what tripe murdoch [he doesn deserve capitols or corct splg] feeds us and will probably find the truth is neither... or some-ware in between as communications professionals would say.
Occums Razor! Consider this. There is a 'person zero'. He/She [prol he] ignored basic IT external bus protocol. From this point on everything is logged and verifyable. Everything beyond this is speculation... But.
Imagine if the day before this happened Iran Google searched "Microsoft+Windows+security+venerability" Worried by the search returns Iran isolates its secure assets immediately and switches to a more robust operating system..... I would love to have a Lone Star with G.W. Jr. ans listen to his side.
Another view, from the lovely lady hassling me over my shoulder..... Capitalism. Not only did it make do a great deed for humanity, some may say, but it also made redundant a whole generation of chip-sets for secure applications. I have a UHF/VHF tranciever, made by the Chinese, capable of picking up the ISS. It cost $150. Units with these specs were a thousand bucks five years ago. This is 100% thanks to the wholesale abundance and adoption of certain styles of programmable logic chips. It has nothing to do with cheap labor as most hipsters[tm] will have us believe. Now 'MIL spec' becomes professional. Pro becomes consumer and pre 2010 consumer gear becomes landfill... and life goes on
The 'rootkit' developed by Olympic known as Stuxnet gave its initial developers a once strike only weapon aimed at one target once. The fact that rootkits that exploit the same venerability have been successfully deployed since Stuxnet shows us just how far Irans nuclear reality actually is. Ironically had Iran signed up for a legal nuclear power program your IAEA would have warned them about these chips. This is Hunter S. Thompson's Third law of gonzo-dynamics.
1- treat every firearm like it is loaded.
2- believe none of what you hear and half of what you see.
3- never trust a man that says native code is a good thing.
Occums Razor! Consider this. There is a 'person zero'. He/She [prol he] ignored basic IT external bus protocol. From this point on everything is logged and verifyable. Everything beyond this is speculation... But.
Imagine if the day before this happened Iran Google searched "Microsoft+Windows+security+venerability" Worried by the search returns Iran isolates its secure assets immediately and switches to a more robust operating system..... I would love to have a Lone Star with G.W. Jr. ans listen to his side.
Another view, from the lovely lady hassling me over my shoulder..... Capitalism. Not only did it make do a great deed for humanity, some may say, but it also made redundant a whole generation of chip-sets for secure applications. I have a UHF/VHF tranciever, made by the Chinese, capable of picking up the ISS. It cost $150. Units with these specs were a thousand bucks five years ago. This is 100% thanks to the wholesale abundance and adoption of certain styles of programmable logic chips. It has nothing to do with cheap labor as most hipsters[tm] will have us believe. Now 'MIL spec' becomes professional. Pro becomes consumer and pre 2010 consumer gear becomes landfill... and life goes on
The 'rootkit' developed by Olympic known as Stuxnet gave its initial developers a once strike only weapon aimed at one target once. The fact that rootkits that exploit the same venerability have been successfully deployed since Stuxnet shows us just how far Irans nuclear reality actually is. Ironically had Iran signed up for a legal nuclear power program your IAEA would have warned them about these chips. This is Hunter S. Thompson's Third law of gonzo-dynamics.
1- treat every firearm like it is loaded.
2- believe none of what you hear and half of what you see.
3- never trust a man that says native code is a good thing.
#19
#20
Gets Weekends Off
Thread Starter
Joined APC: Nov 2010
Position: Journo by night, irrigator by day
Posts: 220