Create an Account
username: password:
 
  MemeStreams Logo

MemeStreams Discussion

search


This page contains all of the posts and discussion on MemeStreams referencing the following web page: Fearing Industrial Destruction, Researcher Delays Disclosure of New Siemens SCADA Holes | Threat Level | Wired.com. You can find discussions on MemeStreams as you surf the web, even if you aren't a MemeStreams member, using the Threads Bookmarklet.

Fearing Industrial Destruction, Researcher Delays Disclosure of New Siemens SCADA Holes | Threat Level | Wired.com
by janelane at 4:35 pm EDT, May 19, 2011

It was a vulnerability in a PLC belonging to Siemens’ Step7 control system that was the target of the sophisticated Stuxnet worm. Stuxnet was discovered on systems in Iran last year and is believed to have been designed by a nation state aimed at destroying uranium-enrichment centrifuges at the Natanz nuclear facility in Iran.

Thanks to Decius trying to educate us environmental engineers, I'm a little closer to understanding how totally fucked Siemens' SCADA is. Thanks, Decius!

-janelane


 
RE: Fearing Industrial Destruction, Researcher Delays Disclosure of New Siemens SCADA Holes | Threat Level | Wired.com
by Decius at 2:23 pm EDT, May 20, 2011

janelane wrote:
Thanks to Decius trying to educate us environmental engineers, I'm a little closer to understanding how totally fucked Siemens' SCADA is. Thanks, Decius!

-janelane

lol - To be fair what happened to Siemens with Stuxnet could have happened to any vendor. The attackers were very sophisticated and demonstrated a capability to find vulnerabilities in secure systems. At the same time, it does make sense for security researchers like this one to look for vulnerabilities in these systems as they are obviously potential attack targets. I'm not surprised that this research was successful. Everything has bugs in it. Similar systems from other vendors may be similarly "fucked."


  
RE: Fearing Industrial Destruction, Researcher Delays Disclosure of New Siemens SCADA Holes | Threat Level | Wired.com
by janelane at 3:43 pm EDT, May 20, 2011

Decius wrote:

janelane wrote:
Thanks to Decius trying to educate us environmental engineers, I'm a little closer to understanding how totally fucked Siemens' SCADA is. Thanks, Decius!

-janelane

lol - To be fair what happened to Siemens with Stuxnet could have happened to any vendor. The attackers were very sophisticated and demonstrated a capability to find vulnerabilities in secure systems. At the same time, it does make sense for security researchers like this one to look for vulnerabilities in these systems as they are obviously potential attack targets. I'm not surprised that this research was successful. Everything has bugs in it. Similar systems from other vendors may be similarly "fucked."

Certainly, but in the linked article, the researcher appears particularly appalled at how easy to crack and how numerous the vulns are (beyond any run-of-the-mill vendor).

Maybe he just has higher standards for German conglomerates. :-)

-janelane


 
 
Powered By Industrial Memetics