Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Worms

Stuxnet Worms On 141

Numerous Stuxnet related stories continue to flow through my bin today, so brace yourself: Unsurprisingly, Iran blames Stuxnet on a plot set up by the West, designed to infect its nuclear facilities. A Symantec researcher analyzed the code and put forth attack scenarios. A Threatpost researcher writes about the sophistication of the worm. Finally, Dutch multinationals have revealed that the worm is also attacking them. We may never know what this thing was really all about.
This discussion has been archived. No new comments can be posted.

Stuxnet Worms On

Comments Filter:
  • Maybe it has a ghost that developed from the data inputs of over a billion individuals...

  • Everyone knows Macs don't get viruses

    </sarcastic joke>
  • by elrous0 ( 869638 ) * on Tuesday October 05, 2010 @05:00PM (#33799744)
    I don't think this is just one of those "Look at Iran, making some outlandish crazy new allegation!" thing (like it was when Ahmadinejad tried to claim there were no homosexuals in Iran [youtube.com] or blamed the U.S. Government for 9-11 [cbsnews.com]). Considering the very disproportionate hit they took of these infections, the obvious suspects (those who would benefit most from their nuclear program taking a hit), the precision of the targeting of the virus (two very specific models of Seimens PLC's), the impressive sophistication of the worm, etc. I hardly think it's some tin-foil hat conspiracy theory for them to assert that it was a "western power" (most likely Israel or the U.S.) behind this worm.
    • by Ender_Wiggin ( 180793 ) on Tuesday October 05, 2010 @05:07PM (#33799860)

      I don't think he said there are no homosexuals in Iran, he said "We don't have gay people the way you do in America." I think he means they don't really have openly gay people in society like you find in New York. It's interesting because Iran actually allows and pays for sex-change surgeries.

      • It's interesting because Iran actually allows and pays for sex-change surgeries.

        Is that before or after they administer the death penalty for homosexual acts? [wikipedia.org] And they *sometimes* subsidize surgery [wikipedia.org], which is not the same as "pays for".

        Fortunately, Iran doesn't consider the testimony of women to be trustworthy enough to consider as evidence (see first link).

      • by TheCarp ( 96830 ) <sjc.carpanet@net> on Tuesday October 05, 2010 @05:14PM (#33799966) Homepage

        Thats pretty much what he said. Actually, homosexuality in their culture is a whole topic unto itself. What was interesting to me was the way he seemed to imply that there is a difference between "public morality" and "private". Have you ever seen how many "witnesses" are required to accuse someone of certain things (like being a homosexual) under sharia law, for example?

        What he seemed, to me, to be espousing was the idea that "what you do in private is between you and god, but, what other people see you do, is another matter". In some ways it reminds me of a japanese woman who was interviewed for the book "Lust in Translation" (never read it, but heard several stories about it) who was not mad at her husband for having an affair, as she had her own, but was mad that he was careless and allowed her to find out about it.

        Having known a few Iranian ex-pats, I must say, they have a fascinating culture, and one thats very different from our own in many ways.

        -Steve

        • Re: (Score:2, Insightful)

          by gad_zuki! ( 70830 )

          >they have a fascinating culture, and one thats very different from our own in many ways.

          Finding a death penalty for homosexuality fascinating? It should be horrifying. Same thing for atheism or denying Islam.

          >Thats pretty much what he said.

          Err, transsexualism and homosexuality are two very different things. Iran has a lot of social pressures to force homosexuals into subsidized transsexual treatment, which does nothing but victimize and humiliate homosexuals who have no problem with their gender, its

          • Re: (Score:3, Insightful)

            by at_slashdot ( 674436 )

            >they have a fascinating culture, and one thats very different from our own in many ways.

            Finding a death penalty for homosexuality fascinating?

            Since when the legal system, especially in a religious autocratic regime, is part of "culture".

            • It's sprung out of culture. I guess you could view it as a formalized mask of cultural morality, warts and all?
          • by TheCarp ( 96830 )

            > Finding a death penalty for homosexuality fascinating? It should be horrifying. Same thing for atheism or denying
            > Islam.

            You do realize, I hope, that there is a difference between "I find it fascinating" and "I agree with it" or "I like it". You seem not. I find many aspects of the holocaust fascinating too, even though I have nothing against jews. Hell... I admonish our own soldiers and police for their willingness to use violence to solve problems, I certainly don't condone it in any other circums

    • most likely Israel or US?

      I'm sure there are a lot of countries, like China, that would want to Iran stfu before they get blown up and the oil stops running. It's in the interest of pretty much any industrialised nation that war doesn't break out over Iran.

      • by JustOK ( 667959 )

        China is closer to Iran than we are.

        • by gtall ( 79522 )

          Not only that, China lusts after Iranian oil. It would be in their interest to have a nuclear powered Iran since then they'd have more oil to export. China might feel it can get away with that policy since the Uighurs are Sunni, not Shi'ite and so are unlikely to be supported by Iran.

    • Re: (Score:3, Insightful)

      by MozeeToby ( 1163751 )

      It's worth noting that although many systems have been compromised worldwide, the only reports of equipment actually being damaged are apocryphal reports of 'nuclear accidents' at Iran's centrifuge facilities. The international community has assumed that those accidents were caused by the worm, and Iran calling the worm an attack on their nuclear ambitions seams to support that claim. Personally, I find the second wave of infections more likely to be someone modifying the payload and basic parameters for

      • by jd ( 1658 )

        The article on the Netherlands reports a satellite being knocked out of service. It may not be physical damage in the sense that you could go up there and hit the reboot switch, but short of a shuttle flight to rescue it, you can effectively consider that satellite to be destroyed. It's dead in space. Deceased. Bereft of life. Since it was probably a communications satellite, and thus a repeater, it's an ex-parrot.

        • by Thing 1 ( 178996 )
          My mod points have expired, so I'll just say, "well said" and "that was never five minutes just now!" (In fact, it's been less than a minute, as Slashcode reminded me -- after, I'll have you note, I decided to quote Monty Fucking Python, so it was really neat that Slashcode tripped me up, yet again, to remind me that Slashcode's tripping was topical!)
        • by elrous0 ( 869638 ) *
          No, no, it's just resting.
      • by Thing 1 ( 178996 )

        Personally, I find the second wave of infections more likely to be someone modifying the payload and basic parameters for their own ends, it seems quite different from the mindset that drove the first set of attacks.

        Exactly! Just like, Sony releasing a rootkit (that would have ended up in PMITA prison for you and me) ended up in viruses being written that target that rootkit's additional vulnerabilities. Thus, the second wave.

    • And that's exactly the moral of the story, The Boy Who Cried Wolf.

    • by LWATCDR ( 28044 ) on Tuesday October 05, 2010 @05:36PM (#33800278) Homepage Journal

      I wouldn't even say most likely the US or Israel. I don't think there are many nations that want a Nuclear Iran.
      The list should include.
      China
      Russia
      India
      All of the EU
      Egypt
      Most of the Middle East.
      I mean really this list is long and while this worm is probably outside the limits for some guy with a grudge it isn't outside the limits for any nation with a large university with a good CS department.

      • Re: (Score:3, Informative)

        by Dr. Evil ( 3501 )

        Russia does a lot of business with Iran. Ditto for Germany and the E.U. Where do you think they got all the Siemen's hardware and how do you think they flew it in?

        • I wouldn't even say most likely the US or Israel. I don't think there are many nations that want a Nuclear Iran. The list should include. China Russia India All of the EU Egypt Most of the Middle East. I mean really this list is long and while this worm is probably outside the limits for some guy with a grudge it isn't outside the limits for any nation with a large university with a good CS department.

          Russia does a lot of business with Iran. Ditto for Germany and the E.U. Where do you think they got all the Siemen's hardware and how do you think they flew it in?

          So some of these "friendly" countries had the best access to the iranian nuclear infrastructure, that's enough to warrant their inclusion on the list. Given that stuxnet was "dormant" and not attempting to damage anything it may have been more of an insurance policy and not so much of an active weapon. Any of these countries would love to monitor and have a remote off switch should Iran begin to act against their interests at some future date. Now is this the most likely scenario, no. However it is still hi

        • by LWATCDR ( 28044 )

          So when it all blows up Iran will pay Russia to build it again for a pile of cash...
          Repeat until done.
          Also you might want to read up a bit. Russia has decided not to sell Iran a state of the art SAM system this week.
          Oh and Germany. If it blows up they will again buy more stuff form them.

      • Re: (Score:3, Insightful)

        by elrous0 ( 869638 ) *

        I think Occam's Razor usually applies to suspects too. And in this case the most obvious suspect, with the most to gain by far, is Israel. There is even some evidence [zdnet.com] in the code that this is the case, and the Israeli government itself has openly acknowledged [upi.com] that it has extensive cyber-warfare plans.

        Now of course, there are any number of ways to dismiss this if you REALLY want to believe that Israel wasn't involved (and it's always possible that they weren't). But you can do that with any case, no matte

      • It takes considerable resources to put something like this together, and the two probable entities would be the USA (DoD/NSA)or the gov't. of Denmark, as these are the only two countries (other than Germany, but I would discount them) who have the requisite relationships with Siemens and other groups to pull this off.
    • I hardly think it's some tin-foil hat conspiracy theory for them to assert that it was a "western power" (most likely Israel or the U.S.) behind this worm.

      Possibly. What if they were having problems getting their plant working, and didn't want to look bad. Something like this might be a great way to blame the west, and get sympathy from other countries that might be willing to help out a victim of western aggression.

      Or, this might be the work of a western NGO. There are any number of groups that aren
      • by elrous0 ( 869638 ) *
        The bizarre claim that Iran did this to themselves is by far the silliest claim I have yet heard on Stuxnet. I can understand arguing for China, Britain, or even Russia. But arguing that Iran sabotaged *itself* reminds me of old lynching victim death certificate bit: "Victim suffered a broken neck, 20 gunshot wounds, and was severely burned. Cause of death: Suicide."
    • And the claim short skirts cause earth quakes, that a western agent shot Neda, that the elections were fair etc etc.

      And then you swallow WHOLE the claim that Iran was hit hard by stuxnet... a claim made by WHO? Verified by who? And couldn't a big outbreak just be an indication of really bad security in Iran IF the claim is even true? The worm has also attacked in Indonesia and Holland. Might other places where better security kept it limited just kept quiet? After all, if MY security was bad I wouldn't tel

      • by elrous0 ( 869638 ) *

        nd then you swallow WHOLE the claim that Iran was hit hard by stuxnet... a claim made by WHO? Verified by who?

        Symantec made this crystal clear in their white paper [symantec.com] on the worm. Or do you think that Symantec is in the tank for Iran?

        As for your rant about amateurs being able to write this worm, it's quite clear you haven't taken even a cursory look at it. Everyone who knows anything about worms who's looked at it has acknowledged that this is the most sophisticated piece of malware they've ever seen. This was

  • Is there a big market for pirated Seimens PLCs?

    You know, the Chinese business plan where they run off extra copies after the assembly line closes, and sell them for pure profit? Also the move where they change virtually nothing but the name and start selling it as a generic model at Walmart / Harbor Freight / etc?

    Maybe it was an attempt to "get" the infringing Chinese devices that got a little out of control and got the real ones too?

    • by _merlin ( 160982 )

      Your hypothesis reminds me of the "Frankie" virus [nai.com] that targeted pirated versions of Aladin (a Mac emulator for Atari ST). It ended up attacking most Mac emulators on the ST, and not just the ones it was supposed to target (although some, like SPECTRE, were naturally immune).

    • by chill ( 34294 )

      No. The PLCs are attached to multi-million dollar, room-sized equipment that was already purchased. Pirating a PLC is like buying an Rolls Royce Phantom for $450,000 and not wanting to pay $2.50 for a replacement spark plug.

  • by SuperKendall ( 25149 ) on Tuesday October 05, 2010 @05:12PM (#33799942)

    I'm pretty sure Stuxnet is in fact a sophisticated attack worm created by a government to slow or halt Iran in producing nuclear weapons.

    There are plenty of candidates beyond the U.S. and Israel - Saudi Arabia for one, would be another country really not happy with a nuclear Iran, though certainly the U.S. or Israel seems most likely.

    But lets consider the most intriguing possibility - a country with tons of expertise in developing advanced malware already, and one with incredibly detailed knowledge of Iranian systems.

    Of course, I'm speaking of Russia.

    At first it sounds crazy because Russian scientists are helping Iran build a reactor in the first place. But perhaps that help was lined up long before, and Russia has decided Iran is too crazy now to be allowed to have The Bomb, so they activated Stuxnet, prepared in advance for such an eventuality. Or perhaps they simply wanted to get money from the help and then the cleanup...

    Russian scientists have been fleeing Iran because Iran is now going after guys in cubicles and saying they are spies. So perhaps even there, they know something most of us do not...

    • Let's consider this possibility: Iran couldn't get the Nuclear Facility up and running properly so they needed a scapegoat. Now, it can't be something simple or else they'd be considered to be incompetent. Also, they'd need to be able to track the problem to a malevolent source, again, so they can shift all blame away from themselves. So what do they do? Create a virus that will be released into the wild and contains obscure references to past Israeli-Iranian conflicts. The virus has the bonus effect of all

    • Re: (Score:3, Interesting)

      Consider this possibility: the last time [arstechnica.com] people were accusing a government of being behind an attack, it was someone with a grudge but no government connection. Considering how hard it is (or even impossible) to tell the difference between a talented amateur and a professional when it comes to computers, why is everyone jumping on the government bandwagon? Maybe it's some college buddies in Tel Aviv who decided that they wanted to target Iran, or maybe Stuxnet was just a worm of the week from blackhats (man
      • Re: (Score:3, Insightful)

        by perpenso ( 1613749 )

        ... Maybe it's some college buddies in Tel Aviv who decided that they wanted to target Iran, or maybe Stuxnet was just a worm of the week from blackhats (many of which are getting ridiculously complex) that just happened to get into the Iranian facilities ...

        They needed a lot of expensive industrial control equipment to develop and test on.

        • They needed a lot of expensive industrial control equipment to develop and test on.

          That is the part that totally screams to me "government".

          Defiantly not the work of one guy in a basement.

          Now it could be some large and well funded organization, sure. But I just don't buy that it's an amateur effort instead of a well funded affair, and if it's someone like organized crime where is the payoff? Organized crime funds botnets because they make money from them, it's why for some time now no worm or botnet has r

    • by Yvanhoe ( 564877 )
      A question I always ask : why should it be a government ? I estimate a budget of one million dollar to create this thing, and that's a high estimate. That's more than a hobbyist budget (through it could be, if made by the original zero-day finders) but in the range of many organizations. It could also very well be a criminal organization who had simply money as their motive. I am sure that with such an infection on so many presumably critical structures, getting more than one million in blackmailing must no
      • Re: (Score:3, Interesting)

        by znerk ( 1162519 )

        I estimate a budget of one million dollar to create this thing

        [citation needed]

        If I were to pull a number out of my ass on what it would take to create any virus-like program, I would set the budget at:
        (1) extremely dedicated individual with internet access and some time on his/her hands.

        The information required for attacking practically anything is available online. Yes, looking for the information might raise some red flags, and accessing it could most certainly do so, but if the person perpetrating said attack is clever and careful (and maybe lucky, as well), there

        • by Yvanhoe ( 564877 )
          Well, the number the press is shouting everywhere is that it costs $250,000 to buy a 0-day exploit thatis not public. Of the 4 zero-days used, two were known. That leaves, at most, $500 000 for the two others. There is also a cryptographic certificate to get. I suspect this is at least as much expensive. 1 million is a high-range estimation I, yes, somehow put out of my ass by making very inflated guesses. It could also be a single person discovering the two unknown flaws that used them to steal Realtek's c
          • by Magada ( 741361 )

            You forget the money required to find out the actual sequence of commands that would do actual damage in an actual real-world plant. That could be very, very expensive for someone living halfway around the world from the intended target or it could cost nothing for, say, a technician at Natanz.

    • I mean Stux is a variety of linux from Italy:

      http://gpstudio.com/ [gpstudio.com]

    • There's another possibility which occurred to me. You know all those reports we read warning that our power grid is vulnerable to computer attack? Maybe someone making those warnings got tired of being ignored and decided to demonstrate how easy it was?
  • Who hates the Iran's state-sponsored cultural intolerance and the Dutch?
    Austin Powers' father.
  • by Ender_Wiggin ( 180793 ) on Tuesday October 05, 2010 @05:20PM (#33800056)

    Despite the numerous slashdot articles and buzz about it, I'm seeing scant actual details.

    How was it delivered? Via Internet? Botnet? Unknown at this time? According to the article it "can spread using several vectors."
    It also says 2 of the 4 zero-day vulnerabilities have been patched by MS.

    The article about a possible attack scenario leads more credibility to the claim that there had to be inside help. You need people on the inside for Reconnaissance and deployment. Even if it was spread from the internet, someone had to get ahold of the security certificates to crack them and know the specific types of PLCs in use. The arrests [slashdot.org] that recently took place in Iran are making a lot more sense, despite all the knee-jerk condemnation from the /. posters.

    • by MozeeToby ( 1163751 ) on Tuesday October 05, 2010 @05:39PM (#33800304)

      Speculation/rumor is that the attack vector was USB drives used by Russian contractors. That is also it's primary method of spread, but it may be able to spread over networks as well (reports that I've seen seem contradictory on that one). Further speculation/rumor has it that a possible "nuclear accident" at Iran's centrifuge facility last year may have been caused by this worm, if that is the case it is the only report of actual hardware being damaged that I've heard of and would 100% support the idea that the worm was targeted at Iran's nuclear facilities. Given the number of infections in Iran and the artificial three hop limit that the worm's writers gave it, it would seem the attack originated there.

      I think it's likely that the writers never planned on having the worm escape the target's network, I'm guessing someone at the nuke facility broke security protocol and took home a thumb drive that they weren't supposed to and it spread from there. The worm doesn't do much except take up cycles on systems that don't match the fingerprint that it is looking for, a fingerprint only makes sense if you're looking to take down a lot of identical systems, which lines up nicely with the centrifuge theory. Basically, it's highly likely that this was a government job, targeting Iran's centrifuges, done with inside knowledge of what systems they were using, and delivered using some pretty basic social engineering (leaving infected USB drives on the ground in the parking lot for instance).

      • by dpilot ( 134227 )

        Somehow this reminds me of grey-goo or tailored virus attacks out of science fiction - and just as well targeted. After all, the "story" happens once things go awry, not while they're working as expected.

    • Re: (Score:3, Informative)

      by AHuxley ( 892839 )
      http://www.csmonitor.com/USA/2010/0921/Stuxnet-malware-is-weapon-out-to-destroy-Iran-s-Bushehr-nuclear-plant [csmonitor.com]
      You have a USB device talking to Microsoft connecting to Siemens "something" then to some industrial system that has to work really well 24/7 and or to exact tolerances.
      Microsoft is the way in, at it seem to be looking for something, like a key and a lock.
      When it finds a match, interesting a 'new' things may happen over time to some industrial system.
      Phone home and uninstaller seem to be part of
    • by boa13 ( 548222 )

      > Despite the numerous slashdot articles and buzz about it, I'm seeing scant actual details.

      That's probably because you're not getting your news at the right place. Here's the detailed technical analysis released last week:

      http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf [symantec.com]

      It's quite an impressive read.

  • My only question is who the hell named it "stuxnet"?
  • Any one has more details on the PLC payload ? I want to know what kind of changes it makes to the plc software.
  • by Animats ( 122034 ) on Tuesday October 05, 2010 @05:22PM (#33800096) Homepage

    This attack is aimed at a very specific PLC configuration, and does nothing unless it finds that configuration. Until someone who has the matching PLC configuration admits it, speculation as to the target remains speculation.

    • by AHuxley ( 892839 )
      "Langner's analysis also shows, step by step, what happens after "Stuxnet finds its target. Once Stuxnet identifies the critical function running on a programmable logic controller, or PLC, made by Siemens, the giant industrial controls company, the malware takes control. One of the last codes Stuxnet sends is an enigmatic “DEADF007.” Then the fireworks begin, although the precise function being overridden is not known, Langner says. It may be that the maximum safety setting for RPMs on a turbin
      • by jonwil ( 467024 )

        Wouldn't Siemens be able to tell (based on the commands sent to the PLC by the Stuxnet worm) what it is trying to do?

        • by AHuxley ( 892839 )
          Layers of NDA? Govs telling them too?
        • Re: (Score:3, Interesting)

          Not necessarily. The "P" in PLC stands for programmable. PLCs have a large amount of generic physical I/O (relay outputs, 4-20mA inputs, etc etc). From looking at the Stuxnet code, you *might* be able to tell that a particular output is being turned on - but without knowing what's wired into that output, you still haven't learned much. And that's a fairly blatant scenario (where Stuxnet is directly controlling PLC I/O),

          If Stuxnet is doing something more subtle, it could be doing something like patching the

  • by Black Parrot ( 19622 ) on Tuesday October 05, 2010 @05:31PM (#33800226)

    Dutch multinationals have revealed that the worm is also attacking them.

    The Wikipedia article [wikipedia.org] has a table of purported number of infections in various countries. Indonesia and India have the worst problem after Iran. Over six thousand in the Anglophone countries. If this is in fact only spreading via USB sticks, we've got some really promiscuous behavior going on.

    (You may well be skeptical of the six million reported for China. It's not a defacement; there's a link to an article that quotes someone actually making the claim. But the quote makes it sound like the speaker doesn't know what he's talking about.)

  • I doubt the US had anything to do with it, we have a administration with "no bag" in office. Isreal on the other hand would be my first suspect. I can only hope that part of the stimulus money made it to a worthy cause such as this.

    • I doubt the US had anything to do with it, we have a administration with "no bag" in office.

      The US intelligence agencies have a long history of doing things without getting clearance from the White House.

  • I hope this is The Daemon [thedaemon.com] spreading. :)

  • Siemens has a support and advisory page on Stuxnet [siemens.com], which is infecting their Simatic WinCC / PCS7 systems.
  • Before Stuxnet, I'm sure the general public had no idea that Siemens was selling technology to Iran to fulfill its nuclear ambitions. Given that the west has a lot of misgivings about letting Iran do so, shouldn't western companies be a little more careful who they sell nuclear reactor parts to? I don't necessarily want to compare them to IBM's role in selling computers to the Nazis, but is there some point where you take some corporate responsibility before profits?

    • Iran knows how to buy things through complicated webs of shell companies in order to hide the final destination.

    • My guess, is that the tech was sold to Russian contractors who then sold and installed the tech for Iran.

    • Isn't there some point where we realize Iran is a sovereign nation and as such is well within their rights to pursue nuclear technologies? Did Siemens directly violate trade embargoes? If that's the case, that's where you take them to the task. I haven't followed this issue so I don't know if Siemens violated any laws on the matter, but if it's a "well, I just don't think those guys should have that stuff..." public sentiment issue, I don't see why they would (or should) care.
    • by dave562 ( 969951 )

      A lot of technology falls under the multi-purpose loop holes. A PLC is a standard industrial component. It is a "programmable logic controller". It simply activates machinery and coordinates activities in industrial machinery. The PLC doesn't know if it is opening a valve that is dumping gas into a centrifuge, or water into a sanitation system.

    • by gtall ( 79522 )

      Siemens is on record as stating they have never sold equipment to Iran and presumes they got it through third parties.

  • "Almost all SCADA systems are -- for safety reasons -- standalone: not connected to a network, let alone the Internet."

    should actually read:
        "In theory, almost all SCADA systems are -- for safety reasons -- standalone: not connected to a network, let alone the Internet."

  • Intriguing. (Score:3, Informative)

    by jd ( 1658 ) <imipak@ y a hoo.com> on Tuesday October 05, 2010 @08:42PM (#33802338) Homepage Journal

    Those marking me "troll" for having said earlier that other, definitely and unquestionably innocent, victims could happen, and then marked me "troll" for noting that the protections against such accidents didn't mean they wouldn't happen anyway, will doubtless ignore the fact that the Dutch are (a) not Iranian nuclear weapons scientists, and (b) that the only Iranian victims so far have been moderates who might have kept the program somewhat sane have now been arrested as spies. Iran is not known for treating those they suspect of spying very nicely.

    It is indeed unclear who the worm was aimed at, but I'm confident that it wasn't the Dutch and I'm now more certain than ever that other innocent victims will turn up. We have proof now that the safeguards (however well-intentioned) did not work. Which is no great surprise - it's hard to have a failsafe weapon as there are so few scenarios in which you need a weapon that badly and have it be safe if it fails.

    • by Thing 1 ( 178996 )

      It is indeed unclear who the worm was aimed at, but I'm confident that it wasn't the Dutch and I'm now more certain than ever that other innocent victims will turn up.

      Interesting. I tell you "I am a victim" so therefore I could not have written the virus. Hmm... (Just interesting, definitely not informative or insightful -- pre-meta-modding.)

      • by jd ( 1658 )

        I did not say the Dutch did not write the virus, I said I was confident they weren't the target of it. Veeeery different things. If you want to critique my views, that's great and I learn a lot from people doing so. But it isn't terribly useful when you don't first read what it is you critique.

  • by lennier ( 44736 ) on Tuesday October 05, 2010 @09:41PM (#33802904) Homepage

    Someone had reprogrammed the DNA synthesizer, he said. The thing was there for the overnight construction of just the right macromolecule. With its in-built computer and its custom software. Expensive, Sandii. But not as expensive as you turned out to be for Hosaka.
    I hope you got a good price from Maas.
    The diskette in my hand. Rain on the river. I knew, but I couldn't face it. I put the code for that meningial virus back into your purse and lay down beside you.
    So Moenner died, along with other Hosaka researchers. Including Hiroshi. Chedanne suffered permanent brain damage.
    Hiroshi hadn't worried about contamination. The proteins he punched for were harmless. So the synthesizer hummed to itself all night long building a virus to the specifications of Maas Biolabs GmbH. Maas. Small, fast, ruthless -- All Edge.

    New Rose Hotel, 1981.

    Wonder if we'll ever find out what Stuxnet did in 2010, and if it did what its designers hoped.

  • Win32/Stuxnet might be described as a worm of a slightly different color, though it’s attracted interest from the media that’s comparable in intensity to Conficker, or Code Red, or Blaster. David Harley did an interesting piece on this... http://www.securityweek.com/stuxnet-sux-or-stuxnet-success-story [securityweek.com]
  • Has anyone actually seen physical evidence that Stuxnet was present on one of the Iranian nuclear power computers?
    Or is it possible that their nuclear program has serious problems and they decided to create some propaganda to shift the blame to their arch-enemies?
    I personally wouldn't take the chance that it was the latter case. As a matter of history, the Soviet Union was far less advanced than originally thought but it took a surge in Cold War activities to find out.
    If there is a third world war, IMHO it

"What man has done, man can aspire to do." -- Jerry Pournelle, about space flight

Working...