You seemto be talking about the stuxnet worm which could attack Programmable Logic Controllers (PLC)s. It seems to be very sophisticated and required large resources to develop.USBs are now spreading malware in the same way floppy disks used to.I can see the PC on which you run your IDE getting infected though I doubt the arduino could get infected in any meaningful way i.e. somebody being able to control something.
And those PLCs were usually plugged into computers running unpatched or pirated versions of Windows XP.
Internet has no business in nuclear reactor control rooms.
Quote from: wizdumAnd those PLCs were usually plugged into computers running unpatched or pirated versions of Windows XP. That reads as the words of some spokesman of Microsoft trying to convince the world to buy their latest products (over and over and over again).Unpatched computers are no problem whatsoever and are more or less standard in SCADA systems that are not connected to an other than the internal network.That means no internet connection whatsoever.Internet has no business in nuclear reactor control rooms.Patching systems that are part of critical (nuclear) processes is something that has to be tested extensively before applying that patch.You won't be able to do that every "patch tuesday".So if the base is stable, and you have no external (network) connections why would you need to patch/update of which you don't know what that will do with stability.If you do need to backup or update/restore the SCADA application, you should use media that is only used for that goal and that is loaded from a system that meets the same conditions or is up to date.
these infected sticks are starting to see code to communicate and upload to microcontrollers PLCs in one example infecting via the stick inside a nuclear station uranium enrichment plant where it dpread [sic] machine to machine looking for hardware controllers then speeding up the servos gas centrifuges or slowing thrm[sic] down to destroy rods/ disrupt yield i think...
Quote from: wizdum on Aug 20, 2013, 10:13 pmAnd those PLCs were usually plugged into computers running unpatched or pirated versions of Windows XP. I have dozens of PLC's under my control at work, none of them require attachment to a PC, and when they do its typically via a GPIO interface (ISA PCI USB whatever) sending single bits on single channelsnot saying that machines dont use direct computer connections over some bus, but its typically a very simple bus, much like an arduino ... so unless your saving raw data from a plc, packing it up and running it as a windows exe, its not that big of a deal
Stuxnet installs malware into memory block DB890 of the PLC that monitors the Profibus messaging bus of the system. When certain criteria are met, it periodically modifies the frequency to 1410 Hz and then to 2 Hz and then to 1064 Hz, and thus affects the operation of the connected motors by changing their rotational speed. It also installs a rootkit - the first such documented case on this platform - that hides the malware on the system and masks the changes in rotational speed from monitoring systems.
Please enter a valid email to subscribe
We need to confirm your email address.
To complete the subscription, please click the link in the
email we just sent you.
Thank you for subscribing!
via Egeo 16