TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Mysterious safety-tampering malware infects a second site

63 pointsby valiant-commaabout 6 years ago

7 comments

oilmanabout 6 years ago
In a lot of industrial sites software security is a joke. Embedded systems tend to use very old, well proven technology, which in itself isn&#x27;t a problem, it fits the market well, but the side effect is that security isn&#x27;t always properly considered as it wasn&#x27;t a concern when the software&#x2F;hardware was developed.<p>I was involved in a project a few years ago delivering a series of monitoring systems running Windows XP to a brand new 700 million dollar oil rig. This was at the request of the client, they had software they needed that would only run on Windows XP. They had a fit when we had trouble sourcing Windows XP licenses. The expectation is that these systems will have a 20 - 30 year life.<p>It used to be that keeping every air gapped was enough, but organizations want easier monitoring, so more systems are being networked in an ad-hoc way without a lot of thought about security.<p>I expect we are going to see more things like this happening in the future until we start taking security in systems &#x2F; embedded space more seriously. And even then there will be exploits of older systems for years afterwords since the replacement cycle is so long.<p>I wonder what a secure embedded system even looks like when I think about it. The environment isn&#x27;t suitable to the kind of continuous patching that is done in the web world, but exploits will be found and dependencies will need to be updated. How do you square keeping things up to date with stringent testing requirements in systems that can kill people. Many of these systems &#x2F; plants are unique, there is only one plant like it in the world, so testing becomes very hard.
评论 #19628329 未加载
评论 #19629811 未加载
评论 #19628010 未加载
评论 #19629150 未加载
评论 #19628212 未加载
chelmzyabout 6 years ago
Here&#x27;s a Shodan search that will net you 5K+ fuel tank controls.<p><a href="https:&#x2F;&#x2F;www.shodan.io&#x2F;search?query=inventory+port%3A%2210001%22" rel="nofollow">https:&#x2F;&#x2F;www.shodan.io&#x2F;search?query=inventory+port%3A%2210001...</a>
评论 #19631140 未加载
sevensorabout 6 years ago
I once encountered a guy who was setting up systems so that you could control a water treatment plant from your ipad at home. His attitude was, &quot;Modbus on one side, ethernet on the other, what could possibly go wrong?&quot; Lots, I told him. A lot of things could go wrong.
评论 #19628843 未加载
评论 #19628360 未加载
ccnafrabout 6 years ago
Here&#x27;s the direct link to the report: <a href="https:&#x2F;&#x2F;www.fireeye.com&#x2F;blog&#x2F;threat-research&#x2F;2019&#x2F;04&#x2F;triton-actor-ttp-profile-custom-attack-tools-detections.html" rel="nofollow">https:&#x2F;&#x2F;www.fireeye.com&#x2F;blog&#x2F;threat-research&#x2F;2019&#x2F;04&#x2F;triton-...</a><p>Article spends too much time FUDing &quot;plant explosions&quot; for my taste
评论 #19628400 未加载
zarothabout 6 years ago
And this is precisely why we can never consider nuclear power to be “safe”.<p>It’s just not worth the <i>risk exposure</i>. The worst case failure modes must be expected to occur, and they must be economically and ecologically acceptable when they do.<p>The idea that “this can theoretically happen but we promise it won’t” is simply not acceptable. Versus, “this is extremely unlikely to occur because of these numerous counter-measures, <i>but when it does</i> here’s what we do and what it will cost us.”<p>If you can do the later analysis on a nuclear plant and come away satisfied, then build baby build.
评论 #19635494 未加载
评论 #19633332 未加载
评论 #19631149 未加载
mirimirabout 6 years ago
So do they use any code from Stuxnet? That would be ironic.
评论 #19661451 未加载
peppershakerabout 6 years ago
Aren’t these control systems airgapped ? So does that mean someone had to physically plant the malware?
评论 #19627688 未加载
评论 #19628957 未加载
评论 #19627510 未加载