I am concerned though for a long time with computers and programming and was "back in the good old days" my collection viruses on 5 1 / 4 "floppy kept to be able to analyze them later times more accurate and change, but somehow it has stayed with intent and I've never dealt with it.
But if one reads now as ( SPON ) how far we have is real scary relative objectively at
Wikipedia.
The unusually massive nature of its distribution
first taking advantage of various vulnerabilities of Microsoft operating systems from Windows 2000 to Windows 7 or Windows Server 2008 R2
second and the installation of a rootkit in those operating systems using stolen digital signatures of the Taiwanese hardware manufacturer Realtek and JMicron Technology, 3rd
its precise knowledge of the WinCC process visualization system for monitoring and control of technological processes with Simatic S7 (English ICS: Industrial Control System) and fourth
the installation of a further rootkits in the control of such a PCS 7 system (PLC, PLC eng. Programmable Logic Controller)
so far unique in the world.
But then when SPON:
now have malicious software specialists analyzed the functioning of the aggressor and have come to the conclusion that Stuxnet is even more insidious thought as to manipulate its goals for years, without a trace. The pest was probably really Iranian nuclear facilities to the target, should Iran's nuclear program silently sabotaging the long term.
...
The development cost is estimated at millions of dollars, the programming team must have been great. Just the cost of the acquisition of knowledge previously unknown Windows vulnerability must have been a seven. You have made it even Stuxnet to-date protection software to infiltrate unnoticed by computer.
...
The sabotage of Iran's nuclear program, the malware proceed very subtle. Although Stuxnet Symantec says more than 100,000 systems have taken root, he is active only when certain conditions finds. Accordingly, it is designed to attack certain Siemens Computers, the rules on so-called frequency control modules. According to Symantec, the software is only going to drive it, either originating from the Finnish manufacturer Vacon or the Iranian Fararo Paya. That may be no evidence, after all, but an indication that Stuxnets target is Iran's nuclear fuel enrichment plant in Natanz.
the right frequencies
is explicitly refer to the Symantec report, while not, but read between the lines yet clear. After all there is to be noted that only affects Stuxnet drive that operate at frequencies between 807 Hz and 1210 Hz. This is followed prohibited in the report to note that the export of converters, the frequencies above 600 Hz support from the U.S. - because such devices are used in uranium enrichment plants.
It is this drive are urgently needed to control the speed of those centrifuges, which are for the enrichment of nuclear fuel so important. A constant speed is essential for the success of the process, Symatec researcher Eric Chien said in the corporate blog. Therefore, the converters are so important. Get the number of revolutions changed the centrifuge, the heavy concentration of uranium isotopes would be interrupted. The result would be low-grade uranium.
precisely at this point that the Stuxnet According to report. Over a period of months he should vary the frequency of the inverter again and again in different steps. In one example, virus researchers found that it, in one example system, the frequency increased initially after 13 days at 1410 Hz for up to 27 days after first reducing to 2 Hz and right after boot up at 1064 Hz. In this way, it goes on for months.
A real thriller. I can already see the long-haired hard-core programmers who were hired by the CIA to write such a virus or was it Russian? Or some completely different interpretation?
0 comments:
Post a Comment