Hacker News new | past | comments | ask | show | jobs | submit login
Was Stuxnet built to attack Iran's nuclear program? (networkworld.com)
63 points by labboy on Sept 21, 2010 | hide | past | favorite | 27 comments



When I was writing software for industrial PLCs and other controllers over five years ago I always thought that factory guys were paranoid about connecting them to the general IT system which in turn was connected to the internet. Quite specifically they were worried about viruses getting into the industrial PCs and causing production line stoppages. At the time it was just a theoretical possibility. Now it seems they were quite wise to be cautious.


Sounds a bit like the old exploding Siberian pipeline trick to me.

http://en.wikipedia.org/wiki/Siberian_pipeline_sabotage


Buried in the article: "Whoever created Stuxnet developed four previously unknown zero-day attacks and a peer-to-peer communications system, compromised digital certificates belonging to Realtek Semiconductor and JMicron Technology, and displayed extensive knowledge of industrial systems."

Sounds like Siemens has some work to do, although I wouldn't be too hard on them if the CIA or another state is really launching these attacks.


You should definitely blame Siemens. The default password is hard-coded into the system. If you change the password from the default, the system crashes!


If it really is the CIA, then Siemens might actually be in on it. Bonus for them if they can charge the Iranians to patch the holes that Stuxnet has exposed while continuing to feed the agency with new ones.


Siemens AG is not quite an American company.


Would that stop them from working for the CIA? Corporations are about as patriotic as the money they're paid with.


It most definitely would, since Siemens as a company is too expensive and complicated to bribe - even on CIA scale. Also it is public, and is too bureaucratic to get away with that without a trace.

Of course nothing prevents recruiting an engineer or two as CIA operatives, but it's not the same as involving the company.


Who signed Jmicron's and Realtek's certificates? That cert authority may be in on it as well.


That cert authority may be I. On it as well.

Typo or confessing?


correct. I was typing on a phone while shivering in a train after riding my bike to the station


grep uranium | grep -v U238 > /dev/reactor

"according to screen shots of the plant posted by UPI, it uses the Windows-based Siemens PLC software targeted by Stuxnet."

Windows in embedded systems. For nuclear reactors. Sounds promising.


Windows used as development and as visualization/monitoring environment. PLCs themselves are not running Windows.


So, the windows part provide absolutely no control input into the system? Including no operator control input from PC?


from http://www.digitalbond.com/index.php/2010/09/16/stuxnet-targ...

I’m surprised at how often project names for secret projects have some relation on the project. This is really for you conspiracy theorists, but read the Book of Esther in the bible where Esther informs the King of a plot against the Jews. The King then allows the Jews to defend themselves, kill their enemies, … Esther’s was born as Hadassah which means Myrtle. According to Symantec, “While we don’t know who the attackers are yet, they did leave a clue. The project string b:\myrtus\src\objfre_w2k_x86\i386\guava.pdb appears in one of their drivers.”

Seriously you couldn't make it up!


> "I’m surprised at how often project names for secret projects have some relation on the project."

Never a good idea. In World War 2, the Brits figured out the Germans had a single-beam navigation device by it's codename 'Wotan' (a one-eyed god):

http://en.wikipedia.org/wiki/Battle_of_the_beams#Y-Ger.C3.A4...


So, uh, they were compiling off a floppy disk?


Can anyone explain the clue? I don't get it.


This type of attack is going to become much more common in the future.

"Nation States" and their various agencies have been interested in SCADA systems for quite a while. There is no security to speak of in industrial control systems. These systems are out of the view of all but the most sophisticated hackers, and only make the news when things go boom.


I imagine that very few people other than control systems engineers ever have anything to do with Siemens PLCs and their data blocks. Those PLCs are also quite pricey items. Your average script kiddie is never going to have any access to or knowledge of these sorts of system.


Also buried in the article: "Peterson believes that Bushehr was possibly the target. "If I had to guess what it was, yes that's a logical target," he said. "But that's just speculation."


If they are smart and powerful enough to do:

"develop four previously unknown zero-day attacks and a peer-to-peer communications system, compromise digital certificates belonging to Realtek Semiconductor and JMicron Technology, and display extensive knowledge of industrial systems."

then why did this happen?

"In recent weeks, they've broken the cryptographic code behind the software"


They're talking about the encryption of the executable code and data of the worm itself. It can't run if it doesn't decrypt itself at some point. It's not meant to be bombproof, it's just another hurdle.


OK, then it's just sloppy journalism, because that's not 'breaking the encryption of the code', but rather 'snooping on the execution of the code'.


I suspect a lot of that article is sensationalizing and extrapolation from too few data points, on behalf of security experts seeking publicity.


I suspect that next time, the targeting systems of such a worm will be better obfuscated. If this can be achieved, then such sabotage could be carried out with perfect plausible deniability. I find this highly disturbing.


I wouldn't put it past Siemens to be in on this. After all the most profits are made by playing both sides.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: