wazua Mon, Dec 23, 2024
Welcome Guest Search | Active Topics | Log In | Register

Beware of stuxnet virus.
selah
#1 Posted : Friday, October 01, 2010 10:55:45 AM
Rank: Elder


Joined: 10/13/2009
Posts: 1,950
Location: in kenya
A cyber attack hit Iranian industrial systems about 4 months ago and their are worries that the virus which mainly targets industrial system using Microsoft OS is being spread thru the net especially if you try to search for it in the net .

The malware was first targeting Siemens manufactured systems thereby forcing the company to come up with a free antivirus to wipe out the infection.

So please dont search for this stuxnet thing you may end up being infected.
'......to the acknowledgment of the mystery of God, and of the Father, and of Christ; 3 In whom are hid all the treasures of wisdom and knowledge.' Colossians 2:2-3
Eddy
#2 Posted : Friday, October 01, 2010 12:52:40 PM
Rank: Member


Joined: 7/20/2006
Posts: 277
@ selah

Thanks ...... Admin btw what happened to the thumbs up facility that was in SK previously?
arapsonkot
#3 Posted : Saturday, October 02, 2010 1:40:38 AM
Rank: Member


Joined: 10/1/2010
Posts: 143
Location: kenya
we are about to finally terminate ourself .A nuclear plant running on windows -X!
Sent from my iPad" is the new "Haters gonna hate".
kyt
#4 Posted : Saturday, October 02, 2010 1:34:14 PM
Rank: Elder


Joined: 11/7/2007
Posts: 2,182
Is there any harm to search if i use mac OS
LOVE WHAT YOU DO, DO WHAT YOU LOVE.
mukiha
#5 Posted : Saturday, October 02, 2010 7:40:26 PM
Rank: Elder


Joined: 6/27/2008
Posts: 4,114
Stuxnet only affects Siemens Industrial control systems, specifically the PCS7 in the Step-7 family of PLCs (programmable Logic Controllers) and the WinCC SCADA (Supervisory Control and Data Acquisition) systems.

If you are not running any of these industrial control software, the you shouldn't worry about Stuxnet.

If you are and you are using PCs with Windows OS, then you need to take action immediately by visiting:
https://support.automati...6783&ehbid=43876783

There you will find the latest up date information and instructions on how to remove the virus from your PLCs and SCADA systems.

NB: this is the first time ever that virus has been created to target PLC control programmes. Perhaps the fact that it targets Siemens Step-7 confirms that this is the market leader in PLCs...
Nothing is real unless it can be named; nothing has value unless it can be sold; money is worthless unless you spend it.
mukiha
#6 Posted : Saturday, October 02, 2010 7:49:06 PM
Rank: Elder


Joined: 6/27/2008
Posts: 4,114
If you know anyone working in the engineering department of the following companies, please ask them to read the above post:
EABL
BAMBURI
UNILEVER
BAT
COCA-COLA
EAPCC
UNGA
MUMIAS
KENGEN
KPLC
etc

those are the ones I can remember for now that use Siemens Step-7 and WinCC
Nothing is real unless it can be named; nothing has value unless it can be sold; money is worthless unless you spend it.
mukiha
#7 Posted : Saturday, October 02, 2010 7:50:51 PM
Rank: Elder


Joined: 6/27/2008
Posts: 4,114
COPY-PASTE from Wikipedia:

SIMATIC WinCC is a supervisory control and data acquisition (SCADA) and human-machine interface (HMI) system from Siemens. It can be used in combination with Siemens PCS 7 and Teleperm control systems. WinCC is written for Microsoft Windows operating system.[1][2] WinCC uses Microsoft SQL Server for logging and comes with a VBScript and ANSI C application programming interface.[3]

WinCC and PCS 7 are the first SCADA systems to be specifically targeted by malware. The Stuxnet worm can spy on and even reprogram infected systems.[4]
Nothing is real unless it can be named; nothing has value unless it can be sold; money is worthless unless you spend it.
YesuWangu
#8 Posted : Monday, October 04, 2010 5:27:43 PM
Rank: Elder


Joined: 8/11/2010
Posts: 1,588
arapsonkot wrote:
we are about to finally terminate ourself .A nuclear plant running on windows -X!



Laughing out loudly Laughing out loudly
murenj
#9 Posted : Monday, October 04, 2010 5:45:04 PM
Rank: Member


Joined: 7/22/2008
Posts: 851
Location: nairobi
Biblical Clue in Iran Computer Worm points to Israeli Cyber Unit

http://www.telegraph.co.uk/

Computer experts have discovered a biblical reference embedded in the code of the computer worm that has pointed to Israel as the origin of the cyber attack.

The code contains the word "myrtus", which is the Latin biological term for the myrtle tree. The Hebrew word for myrtle, Hadassah, was the birth name of Esther, the Jewish queen of Persia.

In the Bible, The Book of Esther tells how the queen pre-empted an attack on the country's Jewish population and then persuaded her husband to launch an attack before being attacked themselves.

Israel has threatened to launch a pre-emptive attack on Iran's facilities to ensure that the Islamic state does not gain the ability to threaten its existence.

Ralf Langner, a German researcher, claims that Unit 8200, the signals intelligence arm of the Israeli defence forces, perpetrated the computer virus attack by infiltrating the software into the Bushehr nuclear power station

Mr Langer said: "If you read the Bible you can make a guess."

Computer experts have spent months tracing the origin of the Stuxnet worm, a sophisticated piece of malicious software, or malware, that has infected industrial operating systems made by the German firm Siemens across the globe.

Programmers following Stuxnet believe it was most likely introduced to Iran on a memory stick, possibly by one of the Russian firms helping to build Bushehr. The same firm has projects in Asia, including India and Indonesia which were also attacked. Iran is thought to have suffered 60 per cent of the attacks.

Mr Langner said: "It would be an absolute no-brainer to leave an infected USB stick near one of these guys and there would be more than a 50 per cent chance of him pick it up and infect his computer."

Cyber security experts said that Israel was the most likely perpetrator of the attack and had been targeting Iran but that it had not acknowledged a role to its allies.

"Nobody is willing to accept responsibility for this particular piece of malicious software which is a curious, complex and powerful weapon," said one Whitehall expert.

The Iranian authorities acknowledged the worm had struck Bushehr and a statement conceded that the plant would come into operation in January, two months later than planned.

Elizabeth Katina, a researcher at the Royal United Services Institute, said the possibility of a copycat attack on British or American electricity networks or water supplies had been elevated by the release of Stuxnet.

"Critical national infrastructure is at greater risk because this shows groups on the outside of governments how to do it," she said. "It's more likely now that the northeast of England power grid can be shut down until someone decides to start it up again."
Users browsing this topic
Guest
Forum Jump  
You cannot post new topics in this forum.
You cannot reply to topics in this forum.
You cannot delete your posts in this forum.
You cannot edit your posts in this forum.
You cannot create polls in this forum.
You cannot vote in polls in this forum.

Copyright © 2024 Wazua.co.ke. All Rights Reserved.