Go Back   IceInSpace > General Astronomy > General Chat
Register FAQ Calendar Today's Posts Search

Reply
 
Thread Tools Rate Thread
  #1  
Old 01-12-2010, 10:49 AM
Kal's Avatar
Kal (Andrew)
1¼" ñì®våñá

Kal is offline
 
Join Date: Nov 2006
Location: Sydney
Posts: 1,845
Modern cyberwarfare

I was reading this article about how a worm specifically targeted Iran's uranium enrichment plant to sabotage operations, and it reminded me of the siberian pipeline sabotage that the CIA orchestrated. Fascinating stuff, it astounds me at how sophisticated modern warfare is.

I just wonder about how much unknown cyberwarfare activity is currently going on
Reply With Quote
  #2  
Old 01-12-2010, 10:56 AM
multiweb's Avatar
multiweb (Marc)
ze frogginator

multiweb is offline
 
Join Date: Oct 2007
Location: Sydney
Posts: 22,079
Quote:
Originally Posted by Kal View Post
I was reading this article about how a worm specifically targeted Iran's uranium enrichment plant to sabotage operations, and it reminded me of the siberian pipeline sabotage that the CIA orchestrated. Fascinating stuff, it astounds me at how sophisticated modern warfare is.

I just wonder about how much unknown cyberwarfare activity is currently going on
Wow! Skynet kind of stuff hey? ABADABADAHH! Cool. Now we just need to facebook their a$$.
Reply With Quote
  #3  
Old 01-12-2010, 10:59 AM
Kal's Avatar
Kal (Andrew)
1¼" ñì®våñá

Kal is offline
 
Join Date: Nov 2006
Location: Sydney
Posts: 1,845
So the million dollar question is who could have pulled this off? CIA? Mossad?

Quote:
Langer argues that no single Western intelligence agency had the skills to pull this off alone. The most likely answer, he says, is that a consortium of intelligence agencies worked together to build the cyber bomb. And he says the most likely confederates are the United States, because it has the technical skills to make the virus, Germany, because reverse-engineering Siemen’s product would have taken years without it, and Russia, because of its familiarity with both the Iranian nuclear plant and Siemen’s systems.

There is one clue that was left in the code that may tell us all we need to know.

Embedded in different section of the code is another common computer language reference, but this one is misspelled. Instead of saying “DEADFOOT,” a term stolen from pilots meaning a failed engine, this one reads “DEADFOO7.”

Yes, OO7 has returned -- as a computer worm.

Reply With Quote
  #4  
Old 01-12-2010, 11:14 AM
AdrianF's Avatar
AdrianF (Adrian)
Currently Scopeless

AdrianF is offline
 
Join Date: Sep 2007
Location: Moura Qld
Posts: 1,774
That where they went wrong they use Win7 to control the plant.

Very sophisticated virus.


Adrian
Reply With Quote
  #5  
Old 01-12-2010, 11:52 AM
multiweb's Avatar
multiweb (Marc)
ze frogginator

multiweb is offline
 
Join Date: Oct 2007
Location: Sydney
Posts: 22,079
Quote:
Stuxnet. Shaken, not stirred.
Reply With Quote
  #6  
Old 03-12-2010, 02:14 PM
Ric's Avatar
Ric
Support your local RFS

Ric is offline
 
Join Date: May 2006
Location: Wamboin NSW
Posts: 12,405
That's awesome Andrew, thanks for the link.

As you say I wonder what else is lurking out there in cyberspace.

Cheers
Reply With Quote
  #7  
Old 03-12-2010, 02:56 PM
gary
Registered User

gary is offline
 
Join Date: Apr 2005
Location: Mt. Kuring-Gai
Posts: 5,999
Hi Kal,


Quote:
Originally Posted by Ed Barnes
There is one clue that was left in the code that may tell us all we need to know.

Embedded in different section of the code is another common computer language reference, but this one is misspelled. Instead of saying “DEADFOOT,” a term stolen from pilots meaning a failed engine, this one reads “DEADFOO7.”

Yes, OO7 has returned -- as a computer worm.
In the paragraph quoted above, I think the journalist, Ed Barnes, will simply
be taking a chunk of artistic license. Specifically, at best, the writer will not have been
reading the source code but simply a hex dump. It won't be DEADFOO7 but
DEADF007 which is simply a hexadecimal number string and purely coincidental,
just as strings such as CAFEF00D now and then can be found in an arbitrarily
long binary.

As for the suggestion that DEADFOOT is a "common computer language reference",
that is certainly a new one on me and I have been associated with computing
and embedded systems since 1975 and a member of the IEEE for 33 years.
(I still have a copy of the Intel 4004 databook on the bookshelf as a keepsake
to remind me now and then of how it all began.)
Reply With Quote
  #8  
Old 03-12-2010, 03:53 PM
Octane's Avatar
Octane (Humayun)
IIS Member #671

Octane is offline
 
Join Date: Dec 2005
Location: Canberra
Posts: 11,159
8008135.

H
Reply With Quote
  #9  
Old 03-12-2010, 04:24 PM
AstralTraveller's Avatar
AstralTraveller (David)
Registered User

AstralTraveller is offline
 
Join Date: Mar 2008
Location: Wollongong
Posts: 3,819
I passed the story on to a couple of experts I know. The first one is an OS expert and he found the story creditable except that the journalist doesn't know what a 'zero day attack' is and that the anagrams are ridiculus. The second one works in data security and backup. He knew about Stuxnet but not this story. He found it plausible.

My problem is the route of infection. If that had an 'air gap' to protect the system why did they allow memory sicks? The few outbreaks of malware we've had on campus were caused by infected memory sticks not by anything getting past the firewall (actually malware hasn't been seen here for years - fingers crossed). A friend works for Geoscience Australia and memory sticks are banned there. I believe they are actually locked out of the system (would that be at BIOS or OS level?). Anyway allowing memory sticks on site in a place where they are so careful is amateurish to say the least.

Could it be that Stuxnet is real but the story if a fake to sow confusion in Iran's nuclear program??
Reply With Quote
  #10  
Old 03-12-2010, 04:32 PM
RickS's Avatar
RickS (Rick)
PI cult recruiter

RickS is offline
 
Join Date: Apr 2010
Location: Brisbane
Posts: 10,584
Bruce Schneier's take on Stuxnet: http://www.schneier.com/blog/archive...0/stuxnet.html
Reply With Quote
  #11  
Old 03-12-2010, 04:40 PM
mithrandir's Avatar
mithrandir (Andrew)
Registered User

mithrandir is offline
 
Join Date: Jan 2009
Location: Glenhaven
Posts: 4,161
Quote:
Originally Posted by Octane View Post
8008135.
You're missing a 5. But it's supposed to be on a 7 segment display and viewed upside down:

55378008

Quote:
Originally Posted by gary
As for the suggestion that DEADFOOT is a "common computer language reference", ...
The usual one is DEADBEEF.
Reply With Quote
  #12  
Old 03-12-2010, 04:46 PM
multiweb's Avatar
multiweb (Marc)
ze frogginator

multiweb is offline
 
Join Date: Oct 2007
Location: Sydney
Posts: 22,079
Quote:
Originally Posted by mithrandir View Post
You're missing a 5. But it's supposed to be on a 7 segment display and viewed upside down:

55378008
Which translates to 917741115

Last edited by multiweb; 03-12-2010 at 06:57 PM.
Reply With Quote
  #13  
Old 03-12-2010, 04:47 PM
Octane's Avatar
Octane (Humayun)
IIS Member #671

Octane is offline
 
Join Date: Dec 2005
Location: Canberra
Posts: 11,159
That's just down the road from where I work.

It's at the OS (third party software) level. There's software available which blocks all kinds of devices being plugged in and alerting the relevant authority if someone does try.

They were going to implement that at my workplace but a bunch of directors kicked up a stink and so it was never implemented.

H

Quote:
Originally Posted by AstralTraveller View Post
A friend works for Geoscience Australia and memory sticks are banned there. I believe they are actually locked out of the system (would that be at BIOS or OS level?). Anyway allowing memory sticks on site in a place where they are so careful is amateurish to say the least.
Reply With Quote
  #14  
Old 03-12-2010, 07:57 PM
Kal's Avatar
Kal (Andrew)
1¼" ñì®våñá

Kal is offline
 
Join Date: Nov 2006
Location: Sydney
Posts: 1,845
Quote:
Originally Posted by RickS View Post
Thanks Rick, that is a solid, reasoned evaluation there.
Reply With Quote
  #15  
Old 03-12-2010, 10:16 PM
mithrandir's Avatar
mithrandir (Andrew)
Registered User

mithrandir is offline
 
Join Date: Jan 2009
Location: Glenhaven
Posts: 4,161
Quote:
Originally Posted by RickS View Post
Schneier's take on just about anything security related is worth reading. I love the annual "Movie Plot Threat" contests, and the way he takes the mickey out of the Department of Homeland Insecurity.

I also have a signed copy of his "Cryptography Engineering" for when I feel the need to bang my head on a brick wall. The book doesn't leave grazes, cuts and bruises.
Reply With Quote
Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump


All times are GMT +10. The time is now 08:14 AM.

Powered by vBulletin Version 3.8.7 | Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
Advertisement
Bintel
Advertisement