How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History


neilt0

7 posts in this topic Last Reply

Recommended Posts

 

Very nice story, ciberwar is emerging more and more these days and I'm astonished how difficult is to identify military-class malicious codes. More shocking is that all four zero-day sploits used by the malware was public but yet not patched by Microsoft. Maybe MS could offer some reward to those who identify sploits to increase early direct reports.

Link to post

Wow!  In the second half of the 1980s, and early 1990s, I was involved in building , programming and installing Siemens 5 series PLCs, using Step5.  We were also producing hardware which would facilitate networking and PC interfacing of the PLCs.

 

They've obviously moved on a couple of generations to Series 7 and Step7, but the STL code snippets still look familiar.

 

However, as the article mentions, you do need a detailed knowledge about the configuration and programing of the particular implementation in order to do anything of this nature.  The creators/perpetrators of StuxNet must have had a mole within the control system development team.

Link to post
The creators/perpetrators of StuxNet must have had a mole within the control system development team.

 

Well, have another look at the response from a Siemens staff member. I think it was in the second article...  :)

Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Restore formatting

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.