Stuxnet, the worm from Russia America Israel who knows where designed to take out the American power grid Iranian Uranium refinement centrifuges BCS computer something controlled by Siemens machines has gotten a lot of attention.
Rightly so, as it’s the closest we’ve actually come to something that looks like a genuine cyber attack. The worm was exceedingly well designed by all accounts, and meant to operate in a very subtle way.
Wired follows the news of North Korea’s new nuke facility by asking “Could Stuxnet Mess With North Korea’s New Uranium Enrichment Plant?”
Not unless North Korea is run by really big idiots. (Ed: which they are. CD: Yes yes, but that’s not the nuke security scientists!)
The reason? Basically any security attack that exploits bugs in software is a one-shot deal. Bugs are mistakes that get fixed when they are found; if Siemens had known about the holes Stuxnet used, they wouldn’t be there in the first place.
Let’s not think about things that are baked into the systems as design choices that can’t be changed. *cough* BGP *cough.*
I imagine within days, if not hours, of finding out there were problems with their software the good people at Siemens had patches en route to clients.
This is one of the reasons that cybersecurity is different from war and more like espionage. If you know there’s a tunnel under your embassy with listening equipment, you’d do something about it.
If the Stuxnet worm didn’t accomplish it’s mission, those particular holes won’t be available next time. Don’t despair, though; there’s probably a lot more bugs to find.
Oh, and if you haven’t been paying attention before: if you’re running nuclear equipment, be careful where you stick your USB drive, OK?