[ISN] After Stuxnet, waiting on Pandora¢s box

From: InfoSec News <alerts_at_private>
Date: Wed, 21 Sep 2011 00:36:26 -0500 (CDT)
http://www.washingtonpost.com/blogs/checkpoint-washington/post/after-stuxnet-waiting-on-pandoras-box/2011/09/20/gIQAOkw0hK_blog.html

By Jason Ukman
Checkpoint Washington
The Washington Post
09/20/2011

The mysterious computer worm known as Stuxnet has gained more than a 
little notoriety since it was discovered in the summer of 2010. It 
wreaked havoc on Iran’s nuclear program. It stirred suspicions that it 
had been unleashed by the Israelis, the Americans or both. And, last but 
hardly least, it heightened long-standing concerns about the potential 
for a cyber attack on critical infrastructure in the West.

In the case of Iran, Stuxnet worked its way into an industrial control 
system by rather insidious means -- identifying the centrifuges used to 
enrich uranium and causing them to spin so rapidly that they began to 
break. But experts have said that the worm could just as easily serve as 
a blueprint to sabotage machines that are critical to power plants, 
electrical grids and other utilities in the United States and elsewhere.

Ralph Langner, a German cyber expert was among the first to analyze 
Stuxnet and identify its ability to target control systems. Langner, who 
is in Washington this week for a handful of events, including one 
Tuesday at the Brookings Institution, took some time to talk about the 
aftermath of Stuxnet.

He remains as concerned as ever that infrastructure in the United 
States, Europe and elsewhere is vulnerable to cyber attack. And he says 
it’s not going to take a sophisticated attacker or the resources of a 
nation-state to launch a strike that could have major economic and 
national security consequences. Excerpts of the interview are below.

[...]


_____________________________________________________________
Register now for the #HITB2011KUL - Asia's premier
deep-knowledge network security event now in it's 9th year!
http://conference.hitb.org/hitbsecconf2011kul/
Received on Tue Sep 20 2011 - 22:36:26 PDT

This archive was generated by hypermail 2.2.0 : Tue Sep 20 2011 - 22:44:40 PDT