Welcome to European Tribune. It's gone a bit quiet around here these days, but it's still going.
Display:


'Sapere aude'
by Oui (Oui) on Tue Sep 27th, 2022 at 05:20:47 PM EST
[ Parent ]
alias Stuxnet
is not contained even today, according to anonymous sources familiar with its internat'l, inter-agencies coordinated dev as well as Richard Clark and Michael Hayden background commentary. It's a feature, not a bug, to be proud of.

Symantech Research Labs among other ISVs received binary samples from multiple sources within their client networks—worldwide. Interviews with "cybersecurity" vendors recall decoding line by line: Immediate consensus attribute-free, self-executing routines confirmed state-sponsored dev. A month in, aside from counterfeit MSFT digital certificate traced to Taiwan, finding Siemens OS fragments and PLC hardware IDs in the code. Uncertain how to relate the significance of these keys, they resorted to "geopolitical news" reconnaisance to trace checksum operators to anamalous control system events anywhere that preceded the Iran reactor crash. Guess what? Multiple explosions of gas pipelines transiting Iran.

Now, I ask you. Is it any wonder Gazprom did not accept "refurbished" Nord Stream 1 turbines from Canada? Is it any wonder US Treasury, last Friday, licensed Starlink "internet" satellite service for "social media" users in Iran? Is gov.in now pushes for home-grown navigation system any wonder?

Malware infection of industrial control systems kills people.

by Cat on Tue Sep 27th, 2022 at 06:59:00 PM EST
[ Parent ]
Foreign Ministry Spokesperson Wang Wenbin's Regular Press Conference on September 28, 2022
The Paper: Yesterday, China's National Computer Virus Emergency Response Center released a new investigation report on the cyber attacks by the US National Security Agency (NSA). The report detailed how the NSA's Office of Tailored Access Operation (TAO) controls key infrastructure facilities in China and infiltrates into China's Northwestern Polytechnical University's internal network by using servers in countries such as the Netherlands and Denmark to host cyber weapons through stepping-stone attack via Japan, Germany, the ROK and other countries. This enabled the TAO [not that one, the other one] to steal sensitive data including user names and passwords, identification verification data, system logs, access information, files and documents, and network configuration, and information of people with sensitive identities. The US also secretly controls the telecom carriers < wipes tears > of at least 80 countries and conducts indiscriminate wiretapping on global telecom users. Do you have any comment?
Zero Days (2016) featured eNTIty
Wang Wenbin: This is the third investigation report issued by the relevant Chinese institution this month on the US National Security Agency's malicious cyber attack on China's Northwestern Polytechnical University. It has revealed more evidence of massive cyber attacks by the US security agency against China. 

China has in recent weeks demanded explanation from the US and asked it to immediately stop illegal action through various channels. So far, however, the US has been silent. The US could not have been more bombastic and motivated when propagating the lies about "Chinese hackers", yet it has deliberately chosen to be blind and mute in the face of the solid evidence collected by the Chinese institution. What exactly is the US hiding from the world? ...

Besides "dual use" biolabs?
by Cat on Wed Sep 28th, 2022 at 03:16:26 PM EST
[ Parent ]
STUXNET US-Israel Cooperation Cyber Warfare on Iran | @BooMan by Oui on May 31, 2011 |

F-secure Q&A analysis of stuxnet computer worm effects Siemens Process Controllers

Apparently the stuxnet worm did most harm in the ultra-centrifuges plant at Natanz in Iran.

(New York Times) - In early 2008 the German company Siemens cooperated with one of the United States' premier national laboratories, in Idaho, to identify the vulnerabilities of computer controllers that the company sells to operate industrial machinery around the world -- and that American intelligence agencies have identified as key equipment in Iran's enrichment facilities.

Siemens says that program was part of routine efforts to secure its products against cyberattacks. Nonetheless, it gave the Idaho National Laboratory -- which is part of the Energy Department, responsible for America's nuclear arms -- the chance to identify well-hidden holes in the Siemens systems that were exploited the next year by Stuxnet.

SIEMENS Automation Conference 2008
Control System Security Assessments (pdf)

Presenters: Marty Edwards! Idaho National Laboratory
Todd Stauffer, Siemens



'Sapere aude'
by Oui (Oui) on Tue Sep 27th, 2022 at 08:13:47 PM EST
[ Parent ]
by Cat on Wed Sep 28th, 2022 at 03:17:32 PM EST
[ Parent ]

Display:

Occasional Series