As a controls system engineer this is a very troublesome development.
Now its one thing for your refrigerator to go online to get the latest
prices for stuff you're running out of, get infected and shut down. It's
quite another for your LNG processing plant to accept valve operating
instructions from the internet when there are millions of cubic feet of
natural gas on site. No controls engineer in his/her right mind would
let critical control infrastructure even connect to the internet
directly. (yes,yes,yes it's fine to report conditions over some VPN
webpage, but CONTROL ??) Now this troubles me because 1) the internet is
not required, 2) it infects PLC's, which, although simpler than personal
computers, vastly outnumber them in machine control applications
worldwide, 3) it may be exploiting several zero day vulns in WinCE ,
which is a very common OS for control systems that have never been exploited before , 4) it is a sophisticated worm capable of hiding
itself from the PLC programmer 5) it might be propagating via PLC
OS updates without anyone knowing 6) it probably has bugs which could
wreak all kinds of havoc 7) My oncologist uses a 12MeV Siemens LINAC to
give radiation treatments to a dozen people daily, the PLC controls beam
intensity and duration and angle and linear position. How many of the
safety interlocks are coded into the PLC me wonders as the HV supply
contactor kicks in?
http://blogs.forbes.com/andygreenberg/2010/09/22/theories-mount-that-stuxnet-worm-sabotaged-iranian-nuke-facilities/?boxes=techchannelsections
http://news.yahoo.com/s/csm/327178
http://www.telegraph.co.uk/technology/news/8021102/Stuxnet-virus-worm-could-be-aimed-at-high-profile-Iranian-targets.html
http://www.symantec.com/connect/blogs/stuxnet-introduces-first-known-rootkit-scada-devices
http://www.bcs.org/server.php?show=conWebDoc.37297
Anyone familiar with this worm from hell?
Comments rated to be Good Answers: