Page 2 of 2 FirstFirst 12
Results 11 to 20 of 20

Thread: Stuxnet: Most Menacing Malware in History

  1. Registered TeamPlayer Glitch's Avatar
    Join Date
    05-08-07
    Location
    Wichita, Ks
    Posts
    1,785
    Post Thanks / Like
    Stat Links

    Stuxnet: Most Menacing Malware in History Stuxnet: Most Menacing Malware in History Stuxnet: Most Menacing Malware in History
    Gamer IDs

    PSN ID: GlitchKs Steam ID: GlitchKs
    #11

    Re: Stuxnet: Most Menacing Malware in History

    No network is secure unless you have 100% control over the hardware. So unless you lock up your PC's so that they end users can not touch them you are at risk.

  2. Registered TeamPlayer Gumby's Avatar
    Join Date
    07-24-06
    Location
    Colorado
    Posts
    5,025
    Post Thanks / Like
    Blog Entries
    6
    Stat Links

    Stuxnet: Most Menacing Malware in History Stuxnet: Most Menacing Malware in History Stuxnet: Most Menacing Malware in History Stuxnet: Most Menacing Malware in History
    Gamer IDs

    Gamertag: tFHoP Gumby PSN ID: tFHoP_Gumby Steam ID: gumbykey1337 Gumby's Originid: Gumby_C2C
    #12

    Re: Stuxnet: Most Menacing Malware in History

    Quote Originally Posted by Glitch View Post
    No network is secure unless you have 100% control over the hardware. So unless you lock up your PC's so that they end users can not touch them you are at risk.
    True, but good security practices on a closed network defeat even this type of virus. For example, at my work, we have all the important stuff on a closed network. There are no PCs on it, just servers and thin clients. The thin clients have no USB or CD-ROMs. So anything that goes on the from an outside network or from the closed network to the outside network has to come through the IT shop. Furthermore, not just anyone is allowed on the closed network. Also, the servers are physically secured. I am not saying it is 100% secure because that is just not possible and overconfidence is very bad, but it is as secure as possible. As long as the we in the IT department are doing our job correctly, the important stuff is a very hard target.

    Now, not every IT department has the need or money to lock stuff up like that. But even then there are lots of things that can be done to mitigate this type of thing. The best thing (I am assuming we are talking about a Windows shop here) is to use a GPO and completely disable USB and CD-ROM drive use entirely. Just too much risk IMHO. Combine that with locked down BIOS passwords on the workstations to prevent booting to CD-ROM, USB, or floppy and strong protection of the local administrator password in Windows will go a long ways toward preventing this type of thing. USB drives are old school tech anyway. There are far better ways to get your files from point A to point B without having to carry around a physical device.

    There are so many things that a good IT department can do to protect the network that it would be impossible to list them here. The best thing that your company or government agency can ever do to protect its network is to make sure you have a good IT department. Everything that is important is constantly under assault. Make sure you have good people to protect your assets. Because I can promise you this: if your company or agency has any digital assets of any value, there will be good people coming after it.
    Sleep, eat, conquer, meditate, repeat.

  3. Registered TeamPlayer SmokenScion's Avatar
    Join Date
    11-27-06
    Location
    Denver
    Posts
    11,452
    Post Thanks / Like
    Blog Entries
    13
    Stat Links

    Stuxnet: Most Menacing Malware in History Stuxnet: Most Menacing Malware in History Stuxnet: Most Menacing Malware in History Stuxnet: Most Menacing Malware in History Stuxnet: Most Menacing Malware in History Stuxnet: Most Menacing Malware in History Stuxnet: Most Menacing Malware in History
    Gamer IDs

    Steam ID: SmokenScion SmokenScion's Originid: SmokenScion
    #13

    Re: Stuxnet: Most Menacing Malware in History

    blue tooth.

  4. Registered TeamPlayer
    Join Date
    04-17-07
    Posts
    20,817
    Post Thanks / Like
    Blog Entries
    4
    #14
    Quote Originally Posted by Gumby View Post
    True, but good security practices on a closed network defeat even this type of virus. For example, at my work, we have all the important stuff on a closed network. There are no PCs on it, just servers and thin clients. The thin clients have no USB or CD-ROMs. So anything that goes on the from an outside network or from the closed network to the outside network has to come through the IT shop. Furthermore, not just anyone is allowed on the closed network. Also, the servers are physically secured. I am not saying it is 100% secure because that is just not possible and overconfidence is very bad, but it is as secure as possible. As long as the we in the IT department are doing our job correctly, the important stuff is a very hard target.

    Now, not every IT department has the need or money to lock stuff up like that. But even then there are lots of things that can be done to mitigate this type of thing. The best thing (I am assuming we are talking about a Windows shop here) is to use a GPO and completely disable USB and CD-ROM drive use entirely. Just too much risk IMHO. Combine that with locked down BIOS passwords on the workstations to prevent booting to CD-ROM, USB, or floppy and strong protection of the local administrator password in Windows will go a long ways toward preventing this type of thing. USB drives are old school tech anyway. There are far better ways to get your files from point A to point B without having to carry around a physical device.

    There are so many things that a good IT department can do to protect the network that it would be impossible to list them here. The best thing that your company or government agency can ever do to protect its network is to make sure you have a good IT department. Everything that is important is constantly under assault. Make sure you have good people to protect your assets. Because I can promise you this: if your company or agency has any digital assets of any value, there will be good people coming after it.
    Not empty quoting....but this.

    Sent via highly charged bolt of electricity.

  5. Registered TeamPlayer BigHub's Avatar
    Join Date
    06-24-05
    Location
    Texas
    Posts
    19,533
    Post Thanks / Like
    Stat Links

    Stuxnet: Most Menacing Malware in History Stuxnet: Most Menacing Malware in History Stuxnet: Most Menacing Malware in History Stuxnet: Most Menacing Malware in History Stuxnet: Most Menacing Malware in History Stuxnet: Most Menacing Malware in History
    Gamer IDs

    Gamertag: JHubb05 Steam ID: BigHub BigHub's Originid: Hubalicious
    #15
    Quote Originally Posted by DancingCorpse View Post
    Read the article. It doesn't need an internet connection to propagate. Laptops and flash drives used at home that get infected infect the facility when used there on that closed network.

    That's exactly how the facilites in Iran got infected, one person used a flash drive on their personal computer that had gotten infected by ANOTHER USB stick.
    Sounds like an STD.

    Sent from my HTC Thunderbolt

  6. Registered TeamPlayer DancingCorpse's Avatar
    Join Date
    10-21-08
    Location
    Waco, Texas
    Posts
    12,228
    Post Thanks / Like
    Blog Entries
    6
    Stat Links

    Stuxnet: Most Menacing Malware in History Stuxnet: Most Menacing Malware in History Stuxnet: Most Menacing Malware in History Stuxnet: Most Menacing Malware in History Stuxnet: Most Menacing Malware in History Stuxnet: Most Menacing Malware in History
    Gamer IDs

    Gamertag: Dancin Corpse Steam ID: deltacorpse DancingCorpse's Originid: DancingCorpse
    #16
    Quote Originally Posted by BigHub View Post
    Sounds like an STD.

    Sent from my HTC Thunderbolt
    An STD that will only infect you if your IQ is over 150, and doesn't do damage you unless you naturally walk at a precise speed.

    Sent from my LG Optimistic V using Tapatalk

  7. Registered TeamPlayer DJ Ms. White's Avatar
    Join Date
    11-13-07
    Location
    Plano, TX and Ruston, LA
    Posts
    32,364
    Post Thanks / Like
    Blog Entries
    43
    Stat Links

    Stuxnet: Most Menacing Malware in History Stuxnet: Most Menacing Malware in History Stuxnet: Most Menacing Malware in History Stuxnet: Most Menacing Malware in History
    Gamer IDs

    Steam ID: DJMrWhite
    #17

    Re: Stuxnet: Most Menacing Malware in History

    Shit...guess that means no dating physicists for me QQ. Nursing/education majors here I come...not in that way you pervs.
    enf-Jesus its been like 12 minutes and you're already worried about stats?! :-P
    Bigdog-
    Sweet home Alabama you are an idiot.

  8. Registered TeamPlayer Toad's Avatar
    Join Date
    04-01-09
    Posts
    1,974
    Post Thanks / Like
    Blog Entries
    2
    Stat Links

    Stuxnet: Most Menacing Malware in History
    #18

    Re: Stuxnet: Most Menacing Malware in History

    Great article! It's pretty terrifying reading about that stuff, given how the federal government and private industry do security on a lot of critical infrastructure systems.

    An IT group can protect you against some things, but many critical infrastructure systems have massive amounts of fielded equipment on a closed network that technicians have to use daily, and the government likes to use COTS operating systems and hardware when possible to keep costs down. Frequently you do not wind up with USB drive security even if you strive for it.

    Ugh... making me think about work on a Friday night. Scary stuff though.
    Last edited by Toad; 11-18-11 at 09:31 PM.

  9. Registered TeamPlayer Gumby's Avatar
    Join Date
    07-24-06
    Location
    Colorado
    Posts
    5,025
    Post Thanks / Like
    Blog Entries
    6
    Stat Links

    Stuxnet: Most Menacing Malware in History Stuxnet: Most Menacing Malware in History Stuxnet: Most Menacing Malware in History Stuxnet: Most Menacing Malware in History
    Gamer IDs

    Gamertag: tFHoP Gumby PSN ID: tFHoP_Gumby Steam ID: gumbykey1337 Gumby's Originid: Gumby_C2C
    #19
    Quote Originally Posted by Toad View Post
    Frequently you do not wind up with USB drive security even if you strive for it.
    Why not? If you do it right, like I described, USB is either not available or disabled. Most breaches like this are due to bad IT policy or failure to follow a good IT policy. Humans are a bigger risk factor than the tech.



    Sent from my Defy using Tapatalk
    Sleep, eat, conquer, meditate, repeat.

  10. Registered TeamPlayer flame's Avatar
    Join Date
    09-27-06
    Location
    Arlington, TX
    Posts
    6,598
    Post Thanks / Like
    Stat Links

    Stuxnet: Most Menacing Malware in History Stuxnet: Most Menacing Malware in History Stuxnet: Most Menacing Malware in History Stuxnet: Most Menacing Malware in History Stuxnet: Most Menacing Malware in History Stuxnet: Most Menacing Malware in History
    Gamer IDs

    PSN ID: flame862 Steam ID: flame862 flame's Originid: flame862
    #20

    Re: Stuxnet: Most Menacing Malware in History

    Nice article, very interesting read.
    [SsT] Sigs and Avatars-sstflame-png

Page 2 of 2 FirstFirst 12

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Title