http://www.timesofisrael.com/stuxnet-gone-rogue-hit-russian-nuke-plant-space-station/ Tomasz Rola wrote, On 12/11/2013 23:41: > Hi, > > I guess this is news? They say it happened few years ago, but I see it > being reported right now. > > Regards, > Tomasz Rola > > -- > ** A C programmer asked whether computer had Buddha's nature. ** > ** As the answer, master did "rm -rif" on the programmer's home ** > ** directory. And then the C programmer became enlightened... ** > ** ** > ** Tomasz Rola mailto:tomasz_rola@xxxxxxxxxxx ** > > ---------- Forwarded message ---------- > Date: Tue, 12 Nov 2013 20:30:11 +0100 (CET) > From: Tomasz Rola <rtomek@xxxxxxx> > To: <info@xxxxxxxxxxxxx>, Transhuman Tech <tt@xxxxxxxxxxxxx> > Cc: Tomasz Rola <rtomek@xxxxxxx> > Subject: (Times of Israel) Stuxnet, gone rogue, hit Russian nuke plant, > space station > > > > [ > > http://www.timesofisrael.com/stuxnet-gone-rogue-hit-russian-nuke-plant-space-station/ > > ] > > (... links deleted all the way down ...) > > * Tuesday, November 12, 2013 > * Kislev 9, 5774 > * 12:43 am IST > * Site updated 2 minutes ago > > Stuxnet, gone rogue, hit Russian nuke plant, space station > > A cyber-security expert says several ostensibly secure facilities became > victims of the virus that struck Iran's nuclear program > > By [30]David Shamah November 11, 2013, 4:21 pm > > [36]Eugene Kaspersky (Photo credit: Courtesy Tel Aviv University) > Eugene Kaspersky (Photo credit: Courtesy Tel Aviv University) > > > A Russian nuclear power plant was reportedly "badly infected" by the > rogue Stuxnet virus, the same malware that reportedly disrupted Iran's > nuclear program several years ago. The virus then spread to the > International Space Station via a Stuxnet-infected USB stick > transported by Russian cosmonauts. > > Speaking to journalists in Canberra, Australia, last week, Eugene > Kaspersky, head of the anti-virus and cyber protection firm that bears > his name, said he had been tipped off about the damage by a friend who > works at the Russian plant. > > Kaspersky did not say when the attacks took place, but implied that > they occurred around the same time the Iranian infection was reported. > He also did not comment on the impact of the infections on either the > nuclear plant or the space station, but did say that the latter > facility had been attacked several times. > > The revelation came during a question-and-answer period after a > presentation on cyber-security. The point, Kaspersky told reporters at > Australia's National Press Club last week, was that not being > connected to the Internet -- the public web cannot be accessed at > either the nuclear plant or on the ISS -- is a guarantee that systems > will remain safe. The identity of the entity that released Stuxnet > into the "wild" is still unknown (although media speculation insists > it was developed by Israel and the United States), but those who think > they can control a released virus are mistaken, Kaspersky warned. > "What goes around comes around," Kaspersky said. "Everything you do > will boomerang." > > The Stuxnet virus came to light in 2010, having attacked Iranian > nuclear facilities by hitting the programmable logic control > automation systems that control them. The PLC system, manufactured by > German conglomerate Siemens, runs the centrifuges used to enrich > uranium at Iran's Natanz facility. Variants of Stuxnet have affected > the facility's centrifuges in various ways, mostly by changing the > activity of valves controlled by the PLC software that feed the > uranium to centrifuges at a specific rate required for enrichment, > Kaspersky said in several presentations last year. > > It's not known when Stuxnet began its activities, but researchers at > anti-virus company Symantec said that they had gathered evidence that > earlier versions of the code were already seen "in the wild" in 2005, > although it wasn't yet operational as a virus. Stuxnet, said Symantec, > was the first virus known to attack national infrastructure projects, > and according to the company, the groups behind Stuxnet were already > seeking to compromise Iran's nuclear program in 2007 -- the year > Iran's Natanz nuclear facility, where much of the country's uranium > enrichment is taking place, went online. > > Now that the plague has been unleashed, said Kaspersky, no one is > immune -- and that includes its originators, who are no longer in > control of it. "There are no borders" in cyberspace, and no one should > be surprised at any reports of a virus attack, no matter how > ostensibly secure the facility, he said. > > (... links deleted ...) > > Š 2013 The Times of Israel, All rights reserved. > Concept, design & development by > [188]RGB Media > Powered by > [189]Salamandra > Quantcast > > References > > (... all deleted, ouch ...)