On Sep 27, 2010, at 4:39 AM, [email protected] wrote:

> See one of many stuxnet related articles: 
> http://edition.cnn.com/2010/TECH/innovation/09/24/stuxnet.computer.malware/index.html?iref=allsearch
> 
> IMHO a future internet architecture should also envision attacks like stuxnet 
> and even worse ones.

Not sure that routing is relevant. Stuxnet is distributed on USB keys via 
social engineering.

There were four "day zero" attacks in stuxnet, like not qualifying an autorun 
file before executing it. But the faults attacked were more "security 101" 
issues. For example, the applications use the windows default passwords and 
have them hardcoded in, making it hard to change the passwords. Stuxnet used 
guess which passwords. I agree with Roland that it's not routings' job to fix 
end system security; with these kinds of faults being attacked, I'm not sure I 
see how it could.

Comments from a colleague:

> This is what we know:
> 
> - Microsoft issued a security bulletin on July 15, 2010 identifying this 
> vulnerability
> http://www.microsoft.com/technet/security/bulletin/MS10-046.mspx
> 
> - It appears to spread through a combination of thumb drives and social 
> engineering.  It exploits a flaw in Windows when Windows Explorer opens a 
> folder and tries to render the folder's icons.
> 
> - It appears to only target Siemens PLC systems
> 
> - There is evidence that this heretofore-unknown vulnerability was initially 
> exploited in mid 2009
> 
> - It has the hallmarks of a state-sponsored effort, given its sophistication, 
> and that it was written in a modular fashion implying several authors.  It 
> has also primarily attacked systems in Iran and Pakistan.
> 
> - It's not yet known (in unclassified circles, at least) when the trigger 
> will be issued, and what will happen when it is.  Analysts have not yet seen 
> communication with the mothership.
> 
> - Many Siemens PLCs run old, unsupported versions of Windows, such as NT and 
> 2000, so patches are not available for those platforms
> 
> - It exploits default passwords of Siemens PLCs, but users cannot change the 
> default passwords because that will affect the operation of their systems 
> that depend on this password (i.e., hardcoded into the protocols)
> 
> Analysis:
> 
> - This is a truly nasty bugger, since many systems cannot be patched or fully 
> protected.  A reload of the OS will not prevent future attacks.
> 
> - Perimeter security can be set up to prevent communications with known rogue 
> servers in order to protect against remote command and control.
> 
> - Siemens PLCs are used in electric utilities, but are also used in other 
> critical areas such as battleships and other sensitive assets.
> 
> - Network IDS can be used to detect the traffic patterns at this point, but 
> that will not prevent infection, and would not be effective over serial 
> connections and local thumb drive insertions.
> 
> This issue was discussed at the NERC CIP meeting last week, but comprehensive 
> remediation steps were not provided.  Given what we know, it would be 
> extremely hard to fully address this threat, especially for older systems.
> 
> The legacy issue provides an enormous attack surface, given proprietary 
> security mechanisms (if at all), poor coding practices, poor configuration 
> choices (such as depending on default passwords), insecure OS platforms, and 
> connectivity to the Internet.  We will do our best to design security 
> architectures that accomodate legacy systems, but we'll be limited in our 
> efforts.

_______________________________________________
rrg mailing list
[email protected]
http://www.irtf.org/mailman/listinfo/rrg

Reply via email to