Stuxnet, the computer worm widely believed to have been created by western government agencies to target certain countries’ industrial software and equipment, now has some very capable offspring.
Cyber security threats, from sophisticated malware like Stuxnet, Night Dragon and Duqu, or from the publishing of an unprecedented number of security vulnerabilities, are causing a major disruption in the industrial automation market.
If you are a process control engineer, an IT professional in a company with an automation division, or a business manager responsible for safety or security, you may be wondering how your organization can get moving on more robust cyber security practices.
Two industry veterans, Eric Byres and John Cusimano, combine industry standards, best practice materials, and their real-world experience to provide an easy-to-follow 7-step process for improved ICS and SCADA security.
News coverage following the release of the White Paper "How Stuxnet Spreads – A Study of Infection Paths in Best Practice Systems" by Eric Byres, Andrew Ginter, and Joel Langill.
New "How Stuxnet Spreads" White Paper by three leading industrial security experts describes Stuxnet infection pathways and discusses how to protect SCADA systems......
FULL RELEASE
Industrial Control System Security Best Practices Inadequate in Blocking Advanced Malware Threats
New White Paper by three leading industrial security experts describes Stuxnet infection pathways and discusses how to protect SCADA systems
The Stuxnet worm is a sophisticated piece of computer malware designed to sabotage industrial processes controlled by Siemens SIMATIC WinCC and PCS 7 control systems.
This paper describes an example of a site following high security architecture best practices and then shows the ways that the worm could make its way through the defences of the site to take control of the process and cause physical damage.
The paper closes with a discussion of the lessons that can be learned from the analysis of Stuxnet’s propagation pathways. It explains how owners of critical systems need to respond to protect control systems from future threats of this type.
Stuxnet is a computer worm designed to take advantage of a number of previously unknown vulnerabilities present in the Windows operating system and Siemens SIMATIC WinCC, PCS7 and S7 PLS systems.
It takes advantage of numerous vulnerabilities in the Windows operating system and the Siemens product line. As a result, full mitigation requires multiple actions.
The Stuxnet Mitigation Matrix shows mitigation measures by Windows operating system and it includes dynamic links to detailed information on each of the patches and mitigations.
At the beginning of the year I hosted a podcast interview on cyber security with Eric Byres, chief technology officer of Tofino Security. The interview was conducted to help our audience understand the risks of cyber attacks and learn how to mitigate them.
Most automation specialists are shocked to find out how much traffic is on their production control networks. Find out how installing the latest technology and adopting tighter policies for securing production networks can help to protect the integrity of critical control, safety, and regulatory data and processes.