Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Warning over malicious computer worm (infects sw controlling valves in pipelines, powerplants)
Financial Timesw ^ | Sept. 24, 2010 | Joseph Menn , Mary Watkins

Posted on 09/24/2010 6:35:14 AM PDT by SmartInsight

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-45 last
To: SmartInsight

bump


41 posted on 09/24/2010 7:59:51 PM PDT by GOPJ (http://www.freerepublic.com/focus/f-bloggers/2589165/posts)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Still Thinking

Amen to that.


42 posted on 09/24/2010 9:20:19 PM PDT by stylin_geek (Greed and envy is used by our political class to exploit the rich and poor.)
[ Post Reply | Private Reply | To 39 | View Replies]

To: null and void
Worse, Microsoft believes that obscurity is security.

They don't believe that. It's just that Windows is such a complex and arcane contraption that it's too complicated for any given person to foresee how all the thousands of pieces will interact with one another.

Consider the registry key HKEY_LOCAL_MACHINE/SYSTEM/ControlSet001/Services/abp480n5/Parameters/PnpInterface/5 - set to a value of "1" on my system.

The abp4805n5 service was associated with a severe security vulnerability which "lets remote attackers to execute arbitrary code through a web page that triggers existence of an object in memory that was not suitably downloaded or deleted, aka "Uninitialized Memory Corruption Vulnerability."

And that's just one of hundreds of possible services in Windows XP.

43 posted on 09/26/2010 5:39:42 AM PDT by mvpel (Michael Pelletier)
[ Post Reply | Private Reply | To 8 | View Replies]

To: stylin_geek

If you’re interested in all the things examined by the Defense Security Service, check out this page: http://www.dss.mil/isp/fac_clear/download_nispom.html

It’s the National Industrial Security Program Operating Manual. The DSS also maintains a set of Baseline Standards for Windows operating systems, available only to cleared personnel, which is about 150 pages worth of individual Windows registry and configuration settings.

Far too many people don’t take it far seriously enough, though.


44 posted on 09/26/2010 5:49:14 AM PDT by mvpel (Michael Pelletier)
[ Post Reply | Private Reply | To 32 | View Replies]

To: null and void

null and void: “It’s happening.”

Over-generalization (IOW: No it’s not); it’s a targeted event ... besides, the Iranians are all using ‘expired’ Siemens authoring control-software ...

For an interesting read see:
http://www.schneier.com/blog/archives/2010/09/the_stuxnet_wor.html

One of the better posts from that thread:

“The ability to take over a PLC/SCADA plant and make it do something specific is going to take inside knowledge, not just of the networks and SCADA, but of the actual process, wiring and components and so the question is, do the attackers have this information”

Yup that’s my reasoning as well (but I did not put it in my comment above because some people think I say to much as it is (No Nick P I’m not pointing the finger :-)

It’s why I questioned the origin of the worm with,

‘All this actually tells us is that they likley have significant experiance of SCADA or they where a lot closer to the target than people are admitting.’

Which is one of the reasons I sugested that Iran it’s self could have been the “state sponsor”.

Every time I hear about “cyber warfare” and how “crackers could bring down the world” I think ‘yup when they learn to be engineers with domain knowledge and that ain’t goner happen any time soon’.

To have more chance of success than luck as a cracker you have to,

1, Locate your chosen target.
2, Enumerate it for weaknesses.
3, Exploit weaknesses without tripping alarms.
4, Enumerate the internal network without tripping alarms.
5, Locate host controler.
6, Enumerate the host for weaknesses.
7, Gain access to host controler without tripping alarms.

To get this far there are three ways I know,

A, Have “insider knowledge”.
B, Have focused intel and “domain knowledge” to direct the attack.
C, Have “domain knowledge” and use a “fire and forget” attack methodology.

On the face of it this worm appears to be C and similar to the PDF/DOC harvest version of Zeus that went for the .mil network.

However when you look at what would be required to move forward with a real warfare attack then it comes a long way short as you said.

As you dig a little deeper you realise as you said that domain knowledge alone is insufficient to get a real warfare result.

Which means that either,

D, It was trying to close the intel gap.
E, It was a fund raiser / saber rattler.

Personaly from some experiance I would doubt that D would actually get you any where as near as direct human intel. Also D is quite costly compared with direct human intel. Further there is the issue of “footprints and fingerprints” burglers try very hard not to leave signs of “reconosaance” such as footprints, and further they try even harder not to leave positive incriminating evidence such as “fingerprints”.

This worm leaves both footprints and fingerprints, all of which is a little to obvious and makes me start looking for a rat.

Again on the face of it four Zero Day does seem a little extragavent, or does it?

Personaly I think not but my reasoning is long winded.

Which leaves us with shock horror access to code signing keys.

But again how significant is this... we have recently seen the HDCP master key being revealed and not so long ago the keys to TI calculators.

So the question becomes how many other code signing keys have become vulnerable and the answer unsurprisingly is ask how much security is used around the keys...

Generaly not a lot. That is lowley “code cutters” get lowley pay and getting code cranked through the code signing process is a lot easier than people think as the lowly code cutters do not regard it as security just part of the code cutting “handle cranking”.

And often neither do the managers etc, some “bought in” tallent may well have slipped code through the process without any body noticing.

All of which is just as easy for “state sponsored” as it is for “non state sponsored”...

This then brings in the question of “plausible deniability”, by the use of an intermediate party to a third party between a state player and the third party malware cutter.

I could go on but...

Posted by: Clive Robinson at September 23, 2010 12:08 PM


45 posted on 10/02/2010 3:43:16 PM PDT by _Jim (Conspiracy theories are the favored tools of the weak-minded.)
[ Post Reply | Private Reply | To 9 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-45 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson