Stuxnet

Stuxnet News Coverage

A summary of news articles on the game changing Stuxnet malware.

Note: Visit Stuxnet Central for more information on Stuxnet.

Tiny Tofino Logo indicates articles that contain news about Tofino Security, the Tofino Industrial Security Solution or that contain quotes from Eric Byres. 

Defense in Depth

Article from: InTech, November/December 2012

The past two years have been a real wake-up call for the industrial automation industry. For the first time ever, it has been the target of sophisticated cyber-attacks like Stuxnet, Night Dragon, and Duqu.

Eric Byres; "Defense in Depth: A single cyber defense is the weakest form of cyber protection", InTech, November/December 2012

SCADA Security Basics: Why are PLCs so Insecure?

Article from: Automation and Control Technical, October 2012

Recently Eric Byres addressed the difference between SCADA, ICS and other jargon in our industry. In this article Erik Schweigert addresses a question he is often asked “Why are industrial networks so hard to secure?” This is a big topic, so for now he simply addresses “Why are PLCs so insecure?”

Debate: Flame, Stuxnet and other APTs are hype, but still be wary

Article from: SC Magazine, October 2012

In this article Eric Byres promotes his belief that Advanced Persistent Threats are not all hype and that we are entering a new era where industry is a main target in the the growing world of malware.

Process Automation Systems: How Secure Is Secure Enough?

Article from: Control Global, October 2012

In this article, Walt Boyes discusses where to draw the line when applying security to your industrial control system. He begins by looking at the evolution of security in ICS and how to move forward in a practical and realistic manner.

ISA District 12 Leadership Conference

 

Nice, France

October 5-6, 2012

 

Tofino Security Keynote Speaker:

Eric Byres, CTO and VP Engineering

 

 

Presentation: Control System Security in a Post-Stuxnet World

Date: Friday, October 5, 2012

Time: 13:00 - 14:30

Text from Eric's Presentation

SCADA Security Issues – A Virtual Panel Discussion

Article from: EngineerIT, September 2012

EngineerIT invited a group of experts representing a number of companies to contribute to a virtual panel discussion on security issues in supervisory control and data acquisition (SCADA) systems, including a debate around the Air Gap principle.

Tofino solutions for industrial data security

Article from: SA Instrumentation & Control, September 2012

In this article, Extech Safety Systems discusses how preventing the spread of Stuxnet over control networks is key to maintaining safe, reliable and secure industrial systems. The Tofino Industrial Security Solution can mitigate many of the effects of the Stuxnet virus, while also protecting industrial networks against many other methods of accidental or malicious attack.

Belden Responds to Sophisticated Cyber Threats on Critical Industrial Infrastructure

As Advanced Threats Intensify, Belden, Tofino Security and exida Experts Share a Roadmap to Protect Industrial Settings

St. Louis, Missouri – July 12, 2012

Sons of Stuxnet Make Global Energy Infrastructure Vulnerable to Attack

News update from Eric Byres

June 6, 2012

Stuxnet, the computer worm widely believed to have been created by western government agencies to target certain countries’ industrial software and equipment, now has some very capable offspring.

Control System Security in a Post-Stuxnet World

Control System Security in a Post-Stuxnet World

Using ANSI/ISA-99 standards to improve control system security

Article from: Industrial Ethernet Book, February 2012

Today, operators are being asked to isolate automation systems just as ever greater interconnectedness is demanded. Adding to these pressures is the growing fear of cyber attacks such as the infamous Stuxnet.

In this article Eric Byres explains how the ‘zone and conduit’ model included in the ANSI/ISA-99 security standards provides a framework for dealing with network security concerns, including fears of the " Son-of-Stuxnet".

Cyber Espionage comes to SCADA Security

Article from: Automation.com, February 2012

SCADA and Industrial Control Systems operators have been under pressure to increase productivity and reduce costs through network integration.  In addition, proprietary network technologies are being replaced with commercial-off-the-shelf technologies.

At the same time, advanced persistent threats such as Stuxnet, Night Dragon, Duqu and Nitro have made industrial systems their targets.

Cyber Espionage comes to Automation and SCADA

Article from: A&D Magazine, www.AuD24.net (originally published in German)

In this article Eric Byres discusses how SCADA and industrial control systems are vulnerable to cyber attacks, such as Stuxnet and Stuxnet's children.

This vulnerability is unavoidable due to the fact that modern industry depends on electronic information from the outside world to operate. Find out about Eric's suggestions for mitigating this risk.

Next Generation Cyber Attacks Target Oil And Gas SCADA

Article from: Pipeline & Gas Journal, February 2012

In this article Eric Byres discusses Stuxnet the well-designed ICS worm. He discusses what motivates worm creators and hackers, why we can't keep worms such as Stuxnet out of our systems, and how we can move forward in this new era of worms.

Eric Byres; "Next Generation Cyber Attacks Target Oil And Gas SCADA", Pipeline & Gas Journal, February 2012

Ralph Langner: Cracking Stuxnet, a 21st-century cyber weapon

Ralph Langner: Cracking Stuxnet, a 21st-century cyber weapon

 

March 2011 (10:41)

When first discovered in 2010, the Stuxnet computer worm posed a baffling puzzle. Beyond its unusually high level of sophistication loomed a more troubling mystery: its purpose.

 

Stuxnet: Anatomy of a Computer Virus

Stuxnet: Anatomy of a Computer Virus

 

 

June 2011 (3:21)

An infographic dissecting the nature and ramifications of Stuxnet, the first weapon made entirely out of code. This was produced for Australian TV program HungryBeast on Australia's ABC1.

 

SCADA and CIP Security in a Post-Stuxnet World

Presentation from: Tofino Security, October 2011

"SCADA and CIP Security in a Post-Stuxnet World" summarizes a lot of information about the Stuxnet malware and how it has affected SCADA and CIP security. The presentation also goes into detail about the possibilities of a Son-of-Stuxnet.

The presentation is ideal for anyone needing a crash course on Stuxnet, or as a tool for informing management about the implications of it.

ZDNet Podcast: Stuxnet, routing hacks and a seized iPad

Podcast from: ZDNet.com, May 23, 2011

In this AusCERT-related podcast, Stilgherrian, Writer for ZDNet, interviews Eric Byres as he talks about the likelihood of seeing a "Son-of-Stuxnet" worm within the next year.

Other topics of the podcast about AusCERT include the insecurities of internet routing and the drama that started with a Facebook hack and ended with a journalist being arrested.

Podcast: Stuxnet, routing hacks and a seized iPad

What Does Stuxnet Mean for Industrial Control Systems?

Presentation from:  Byres Security, March 2011

"What Does Stuxent Mean for Industrial Control Systems - The Future of Critical Infrastructure Security"  summarizes a lot of information about the Stuxnet malware and discusses what it means for the future of SCADA and ICS security.

This presentation is ideal for anyone needing a crash course on Stuxnet, or as a tool for informing management about the implications of it.

Pages

Subscribe to RSS - Stuxnet