at February 11,2016
Its awesome how it takes the authenticity of known corporation to the main target, and then attacks the main target, I'm wondering what technique can stop such a technology.
at February 11,2016
Probably the scariest thing about this is that these ICS/SCADA related systems are becoming more and more connected over IP based networks as opposed to the serial networks. Given that the presenter said that there were no technical feats with Stuxnet, if its just a matter of getting access to a IP based network these types of attacks will most likely increase. While the engineers may have had the due diligence to ensure anti-virus and have other mechanisms in place, a simple USB drive may have been the ultimate attack vector. The engineers for these types of systems need to understand the impacts of placing them on IP based networks or even allowing USB drive access, from Stuxnet alone you can see the damage it can do. The damage may even be worse if this was against something like a utility system such as power or water.
at February 16,2016
Just another case of people not taking all of the necessary steps to secure their systems. All they had to do was disable that default password on their database and they could’ve prevented this attack. There were also a lot of individual factors that all played a part in the spread of this virus. It first had to get on one of the computers at the site. Then it needed to spread to other systems that were on a different network. So it needed to be able to spread on its own, update itself when it was able to, and allow itself to be copied onto removable media without being detected in order for it to gain access to the system that it needed to target. It’s quite interesting how sophisticated this virus was. There was a lot of time, effort, and research that must’ve gone in to creating this worm in order to pull off this hack.
at February 24,2016
I have been studying Stuxnet every since I started taking IT classes at GMU. It is rare that a semester has gone by without. at least, the mention of stuxnet. It is amazing to learn how none of the software was new to anyone.
Interesting to learn about why the actual Stuxnet file was much bigger than other viruses normally seen. Also great video on how complex the Stuxnet process really was. Great video!
at April 18,2016
Stuxnet is very cool, but could be very dangerous! The thought and logic that went into it is very complicated. It must have been done by a government because of its target and intricacy. If the target was different, all computers may be harmed since it is easily spread and almost untraceable since it has valid certificates.