Announcement

Collapse
No announcement yet.

Stuxnet - malware for nuclear power plants

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

    Stuxnet - malware for nuclear power plants

    I encountered this CNN report about malware which is supposed to attack some nuclear power plants and even operate it. What do you (mainly PCBONEZ) think about it?

    From what I know the main systems run on separate network which is not connected to everywhere so it's impossible to operate it even if it was infected e.g. from USB key. But still, such a direct action seems interesting to me.
    Less jewellery, more gold into electrotech industry! Half of the computer problems is caused by bad contacts

    Exclusive caps, meters and more!
    Hardware Insights - power supply reviews and more!

    #2
    Re: Stuxnet - malware for nuclear power plants

    I'm pretty sure it's the Chinese who did it. So Iran can blame it on the US.
    Originally posted by PeteS in CA
    Remember that by the time consequences of a short-sighted decision are experienced, the idiot who made the bad decision may have already been promoted or moved on to a better job at another company.
    A working TV? How boring!

    Comment


      #3
      Re: Stuxnet - malware for nuclear power plants

      this was supposedly written by the u.s. or israeli government to screw with iran.
      maybe - who knows.

      however, only a complete asshole or a traitor would put critical infrastructure on a public network of any kind or use windows.

      also, only a complete asshole would try to fuck with a reactor - if it goes bad the fallout is probably gonna reach you no matter who you are.

      i also read that there was a bad incident at the Honywell enrichment plant in the u.s. the other day - possibly because they are hiring monkey's to avoid paying union members.
      if that's true then they are assholes too.

      Comment


        #4
        Re: Stuxnet - malware for nuclear power plants

        i would expect a properly set up nuke plant would be isolated from the public network and locked down.even with physical access it would be near impossible to run foreign code on these critical systems.that is if it wasnt installed/maintained by lowest bidder monkeys!

        Comment


          #5
          Re: Stuxnet - malware for nuclear power plants

          Originally posted by kc8adu View Post
          that is if it wasnt installed/maintained by lowest bidder monkeys!
          Which is usually the case in "third world" countries.
          Originally posted by PeteS in CA
          Remember that by the time consequences of a short-sighted decision are experienced, the idiot who made the bad decision may have already been promoted or moved on to a better job at another company.
          A working TV? How boring!

          Comment


            #6
            Re: Stuxnet - malware for nuclear power plants

            Originally posted by Th3_uN1Qu3 View Post
            I'm pretty sure it's the Chinese who did it. So Iran can blame it on the US.
            agree, they've been up to some nasty malware recently.

            Comment


              #7
              Re: Stuxnet - malware for nuclear power plants

              the chinese are owners of a number of iranian gas & oil fields - they wont risk that 25year lease.

              Comment


                #8
                Re: Stuxnet - malware for nuclear power plants

                incidentally, i doubt a usb device could be used,
                i know a guy who admin's at a government building hosting financial data.
                he tells me all 200 odd pc's have epoxy in the usb ports to stop fuckheads plugging ipods & stuff into the machines.

                Comment


                  #9
                  Re: Stuxnet - malware for nuclear power plants

                  same at one insurance company branch here cant even use CDs they have to send them to london to be loaded onto the network.

                  but for on site stuff, working with contractors its a lot of usb stick stuff, camera flashcards onto laptops. shit i even got a virus on my camera flash card for chrissake. usb virus is mostly all the virus we have.

                  then the laptop get connected to the office network later.

                  dont forget there is sanctions on iran. dont expect they can have all the software they want.
                  capacitor lab yachtmati techmati

                  Comment


                    #10
                    Re: Stuxnet - malware for nuclear power plants

                    iran doesnt have torrents?
                    [sarcasm]

                    Comment


                      #11
                      Re: Stuxnet - malware for nuclear power plants

                      Stuxnet is a very impressive piece of malware
                      It makes use of 4 previously unknown security holes in Windows, that is so called "0-day" security holes
                      The virus dates a year back, but was only found this July

                      I come in contact with software from Siemens that is very similar to this, Siemens builds a modular system
                      If you are a machine builder you buy the PLC and the PC with the machine interface from Siemens, the ones I come in contact with have both USB and floppy, user accessible...
                      Siemens also uses some proprietary calls in Windows, why I am not sure but it runs allot of Windows files that are actually branded by Siemens, like the Windows kernel.
                      Updating these will not work, you need a contract with Siemens so you get tested updates from them, this costs money, and takes time (Especially the 0-day vulnerabilities!)

                      Some updates can be installed from MS just fine, however most factories would not want to risk it, if you are wrong you will need to do a restore from backups which can be time consuming...

                      Siemens also uses some databases and things in the background, these have default passwords and if you change them the whole system will fail, Siemens recommendation as a fix for this is to not change the passwords
                      They are also "secret" so if you do change them Siemens will not tell you what they are supposed to be, so you will need to reinstall from backups...
                      Of course the Stuxnet people know what this password is (it's the same on all Siemens systems)

                      The same as true for the Windows accounts and so on, default passwords that Siemens do not recommend you to change

                      The virus is written is several parts, one part, the coolest of them is loaded to the Siemens PC, then talk directly with the PLC and installs itself on the PLC, it does this without interrupting the normal production, it is a monitor driver if you so will, it monitors calls from the Siemens PC to the PLC, and can modify the data, or just let it pass by (and relay it back to whoever is listening)

                      Then there is also another part of the virus, just for spreading on Windows PC's, looking for the real Siemens PC in the network
                      The Virus also sets up a peer to peer network, so it can be updated (This is smart because there is not a single point of attack for the good guys to shut it down, it works just like DHT in the torrent protocol, meaning you can operate even without a tracker, you only need peers that can setup their own swarm...)

                      Siemens has already admitted that 15 plants have been infected worldwide, you can be sure this number is higher
                      Because the Virus is so well written, that it should not if operating normally affect the normal production of the Siemens systems, remember, it is not there to destroy, like normal Viruses you encounter may behave
                      It is there to steal data

                      Siemens system are used today in virtually everything, from small to very large automation systems, like Nuclear powerplants as the article mentions
                      I however doubt the primary target was a nuclear power plant, it is more likely they where after Weapon scematics or similar things, i.e. I do not think they are looking at remote controlling these systems, they are just trying to steal data

                      Now as you can understand with the multiple attack vectors (USB sticks, or other systems in the network infected with the dropper part of the Stuxnet virus) it indeed is a serious threat
                      I actually looked for it at one of our machines at work today, out of curiosity, I did not find anything but then again there are another 20 systems or so in the factory...

                      Also I'd like to say again I do not think the Nuclear factory was the target
                      But your logic is flawed Behemot
                      If the Nuc factory is infected then for sure there is a possible attack vector, be it via USB or an unsecure network
                      Remember it only takes one unsafe entry point on an otherwise safe network to compromise the whole thing, and most attacks happen from within the company (think employees)
                      "The one who says it cannot be done should never interrupt the one who is doing it."

                      Comment


                        #12
                        Re: Stuxnet - malware for nuclear power plants

                        its obvious now that per did it
                        capacitor lab yachtmati techmati

                        Comment


                          #13
                          Re: Stuxnet - malware for nuclear power plants

                          ^ lol agree

                          Comment


                            #14
                            Re: Stuxnet - malware for nuclear power plants

                            Originally posted by Per Hansson View Post
                            If the Nuc factory is infected then for sure there is a possible attack vector, be it via USB or an unsecure network
                            Remember it only takes one unsafe entry point on an otherwise safe network to compromise the whole thing, and most attacks happen from within the company (think employees)
                            What I was saying is that even if the primary systems were infected, they're sepparated from other networks so it's impossible to remotely control the NPP as the article says. But I think any data interchange is minimized in such a factory since when it's working fine, it's better to not repair it, right So there is smaller chance to infect it...
                            Less jewellery, more gold into electrotech industry! Half of the computer problems is caused by bad contacts

                            Exclusive caps, meters and more!
                            Hardware Insights - power supply reviews and more!

                            Comment


                              #15
                              Re: Stuxnet - malware for nuclear power plants

                              I don't know about other countries but our plants don't have any physical connection from anything related to the equipment to the outside world and wireless isn't permitted for anything.
                              Even telephones to the outside aren't permitted in the control rooms.

                              Very little is automatically controlled. - There are humans 'at the switches', not computers.

                              In that field the most computerized circuits do is set off alarms [faster than a human would notice the problem].
                              A human then has to take the corrective action.
                              Computers aren't 'control', they are 'indication'.

                              Also don't use 'industry standard' PLC's on the primary plant.
                              Everything is custom built for a specific purpose.

                              ~~

                              I dunno much about what other countries do except that the Russians are really *&$^ stupid about how their plants work both procedurally and mechanically.
                              [It's been said that you can track a Russian ship with radiation detector. It might even be true.]

                              .
                              Last edited by PCBONEZ; 09-28-2010, 04:57 PM.
                              Mann-Made Global Warming.
                              - We should be more concerned about the Intellectual Climate.

                              -
                              Be who you are and say what you feel, because those who mind don't matter and those who matter don't mind.

                              - Dr Seuss
                              -
                              You can teach a man to fish and feed him for life, but if he can't handle sushi you must also teach him to cook.
                              -

                              Comment


                                #16
                                Re: Stuxnet - malware for nuclear power plants

                                "Primary" has a specific meaning in Nuc Power.
                                It's not a generic term meaning 'important' as it is used everywhere else.
                                .
                                Nuc Plants have a "Primary side" [Reactor plant] and a "Secondary side" [Steam plant].
                                Mann-Made Global Warming.
                                - We should be more concerned about the Intellectual Climate.

                                -
                                Be who you are and say what you feel, because those who mind don't matter and those who matter don't mind.

                                - Dr Seuss
                                -
                                You can teach a man to fish and feed him for life, but if he can't handle sushi you must also teach him to cook.
                                -

                                Comment


                                  #17
                                  Re: Stuxnet - malware for nuclear power plants

                                  Soviet's didn't have as advanced and precise computer systems as americans so they built much more robust power plants. As the time goes on and systems are better, you can higher the thermal and electrical output of the same equipment. VVER440 goes from 440 all to way to 576 MWe.

                                  As for the primary and secondary, that's what I actually meant. I guess less important systems (which are definitelly neither in primary or secondary) could use some of the Siemens PLC's, but these should not harm the power plant severely.
                                  Last edited by Behemot; 09-29-2010, 12:22 AM.
                                  Less jewellery, more gold into electrotech industry! Half of the computer problems is caused by bad contacts

                                  Exclusive caps, meters and more!
                                  Hardware Insights - power supply reviews and more!

                                  Comment


                                    #18
                                    Re: Stuxnet - malware for nuclear power plants

                                    My point about the Siemens systems is that Stuxnet infects only Siemens WinCC and PCS7 systems
                                    So if the nuclear factory indeed was infected it means they do use one of these industry standard' PLC's for their Nuclear Reactor

                                    Weather this article is true or not is anyones guess, as I said I don't believe the Nuclear Installation would be the target at all, for the reasons said above
                                    You would have much better success if you simply worked at the place to steal whatever data you where after, doing it with a virus seems kind of silly (if the Nuclear Reactors control system has been properly built, which is anyones guess, it IS a Russian system, that much we know)
                                    "The one who says it cannot be done should never interrupt the one who is doing it."

                                    Comment


                                      #19
                                      Re: Stuxnet - malware for nuclear power plants

                                      Originally posted by Behemot View Post
                                      Soviet's didn't have as advanced and precise computer systems as americans so they built much more robust power plants. As the time goes on and systems are better, you can higher the thermal and electrical output of the same equipment. VVER440 goes from 440 all to way to 576 MWe.

                                      As for the primary and secondary, that's what I actually meant. I guess less important systems (which are definitelly neither in primary or secondary) could use some of the Siemens PLC's, but these should not harm the power plant severely.
                                      Which part of "*We* DON'T use computers to control OUR Reactors" didn't you understand?
                                      -
                                      It's a requirement set forth in regulations that I'm not going to find for you because the last time I read them many were still Classified.

                                      VVER440 is a 70's era plant and it's a relatively small plant.
                                      [We had ships with plants that big by then.]
                                      We already had some civilian plants bigger than 576 MW in the 60's.
                                      By the 70's plants between 1,000 & 1,200 MW were quite common here.

                                      Some milestones:
                                      In '72 we brought a 2,440 MW plant online. [4x bigger than VVER440.]
                                      In '75 we brought a 830,000 MW plant online. [1440x bigger.]
                                      In '86 we brought a 11,50*1,253 MW plant online. [19,967x bigger.]
                                      Only the 2,440 MW plant has closed.
                                      The others are still 'making waste'.

                                      And none of them have a computer 'in charge'.
                                      We don't do it that way...

                                      My point is your correlation between a computer and plant output is nonsense.

                                      Allowing a computer to control a Nuc plant is dangerous and STUPID.
                                      I'm not surprised the Russians did it.

                                      .
                                      Last edited by PCBONEZ; 09-29-2010, 01:20 PM.
                                      Mann-Made Global Warming.
                                      - We should be more concerned about the Intellectual Climate.

                                      -
                                      Be who you are and say what you feel, because those who mind don't matter and those who matter don't mind.

                                      - Dr Seuss
                                      -
                                      You can teach a man to fish and feed him for life, but if he can't handle sushi you must also teach him to cook.
                                      -

                                      Comment


                                        #20
                                        Re: Stuxnet - malware for nuclear power plants

                                        found an iranian press release.
                                        The Iranian nuclear chief reiterated that the country has the ability to counter "software war."

                                        Salehi went on to say that the virus had not attacked the main system of the plant but was seen on the personal computers of some staff members.

                                        The remark came after Western media claimed that computers at the Bushehr nuclear plant in southern Iran had been infected with the Stuxnet worm.

                                        The Windows-specific malware targets computers using SCADA (supervisory control and data acquisition) -- a control system favored by industries managing water supplies, oil rigs, and power plants.

                                        Comment

                                        Working...
                                        X