7/19/2010 3:41 PM | |
Posts: 15 Rating: (3) |
Just got this from some of the process control security group within Dow Chemical... Some of you may have already seen information about this “Stuxnet” threat to Siemens WinCC and PCS7 products from other sources, such as media reports, etc. Eric Byres is a respected researcher and technology developer in the area of industrial control systems security. You can be sure that any information from this source has been carefully checked and vetted. Eric's email... Over the weekend my team has been investigating a new family of threats called Stuxnet that appear to be directed specifically at Siemens WinCC and PCS7 products via a previously unknown Windows vulnerability. At the same time I also became aware of a concerted Denial of Service attack against a number of the SCADA information networks such as SCADASEC and ScadaPerspective mailing lists, knocking at least one of these services off line. Thus, I decided to create this email to let my friends and associates in the process control and SCADA world know what is happening.As best as I can determine, the facts are as follows:
If you would like to down load the white paper, you will need to register on the web site and I will approve your registration as fast as I can. I have chosen to keep the whitepaper in a secure area as I do not want this information to be propagated to individuals that do not need to know and might not have our industries’ best interests at heart. People who are already www.tofinosecurity.com web members do not need to reregister. Eric Byres P.Eng Chief Technology Officer Byres Security Inc. |
This contribution was helpful to2 thankful Users |
7/20/2010 9:40 AM | |
Joined: 9/1/2005 Last visit: 11/14/2024 Posts: 4113 Rating: (195) |
Dear Users, allow me to call your attention to the following articel published within the Product Support: Current information on malware in connection with Simatic Software Best regards CS Moderator |
My Forum is the place to personalize your profile, |
|
This contribution was helpful to3 thankful Users |
9/27/2010 6:03 PM | |
Posts: 15 Rating: (3) |
Update: From SANS NewsBites Vol. 12 Num 76 (24Sep2010) * The article by Gary McGraw had new details (worth reading) Link: http://www.informit.com/articles/article.aspx?p=1636983
(September 21 & 22, 2010) Emerging analysis of the Stuxnet worm indicates it was designed to attack supervisory control and data acquisition (SCADA) systems rather than steal company secrets. Researchers have noted that Stuxnet was created to attack specific configurations of Siemens Simatic SCADA system software, leading some to speculate that the worm's creators had specific targets in mind. In particular, some believe the worm was created to cause damage at Iranian nuclear facilities. http://www.wired.com/threatlevel/2010/09/stuxnet/ http://www.theregister.co.uk/2010/09/22/stuxnet_worm_weapon/ [Editor's Note (Paller): Gary McGraw describes what he learned about the internal workings of Stuxnet in a briefing he called "Stunning. And awful." Stunning. And awful." http://www.informit.com/articles/article.aspx?p=1636983 (Honan): Symantec has a good write up of this worm at http://www.symantec.com/connect/blogs/exploring-stuxnet-s-plc-infection-process.] |
1/26/2011 8:36 AM | |
Joined: 3/21/2006 Last visit: 11/1/2024 Posts: 10229 Rating: (1181) |
To mention the last update of SIMATIC Security Update (updated 24th January 2011) SIMATIC_Security_Update_V1_0_SP1.exe https://support.automation.siemens.com/Id=43876783 Best regards, Hristo Mihalev |
10/21/2011 10:17 AM | |
Posts: 1 Rating: (0) |
I've also read the news here: Duqu virus uses Stuxnet DNA to mine industrial data and it is really alarming because the virus was intended to mine information from European commercial computers. |
10/21/2011 11:35 AM | |
Joined: 3/21/2006 Last visit: 11/1/2024 Posts: 10229 Rating: (1181) |
And there find the simantec position concerning Duqu - /tf/WW/en/Posts/49814 Best regards, Hristo Mihalev |
Follow us on