Is this more of the same as the alleged attack planning on the Saudi
Stuxnet Clone Found Possibly Preparing Power Plant Attacks
Security researchers have detected a new Trojan, scarily similar to the infamous Stuxnet worm, which could disrupt computers controlling power plants, oil refineries and other critical infrastructure networks.
The Trojan, dubbed “Duqu” by the security firm Symantec, appears, based on its code, to have been written by the same authors as the Stuxnet worm, which last July was used to cripple an Iranian nuclear-fuel processing plant.
“Stuxnet source code is not out there,” wrote F-Secure cybersecurity expert Mikko Hyppönen on his firm's blog. “Only the original authors have it. So, this new backdoor was created by the same party that created Stuxnet.”
This new entry into the Stuxnet family comes just after the Department of Homeland Security (DHS) issued a bulletin warning that the notorious hacking group Anonymous may soon start looking to bring down or disrupt industrial control facilities. Posted yesterday (Oct. 18) to publicintelligence.net, the unclassified bulletin assesses Anonymous' ability to compromise SCADA systems that run power plants, chemical plants, oil refineries and other industrial facilities.
Government officials did not blame Anonymous for any such hacks, and the bulletin says that based on available information, Anonymous has “a limited ability to conduct attacks” on industrial control systems.
The group's agenda could change, however. The DHS document cites several recent actions, including Anonymous' cyberattack on the websites and servers of biotech seed company Monsanto, as proof that Anonymous could “develop capabilities to gain access and trespass on control system networks very quickly.”
Phi Beta Iota: We realize DHS will not be held responsible for being stupid or dishonest or both, but for the record:
1. Stuxnet is said to be an Israeli/US operation against Iran. If it is out within the USA, there are two possibilities, both equally viable; a) the Israelis are doing their usual mayhem against the US which they consider like a Christian girl, as in “shicksas don't count;” and b) it got away from NSA/Cyber-Command or NSA/Cyber-Command is setting the stage for a false flag attack to increase or protect its grossly excessive budget.
2. Anonymous is not after critical infrastructures–Anonymous, like Wikileaks and OccupyWallStreet (OWS) is after institutionalized secular corruption, in which context Monsanto makes perfect sense….along with the Federal Reserve, the International Monetary Fund, and the World Bank.
3. Robert Steele, Bill Caelli, Winn Schwartau, and Jim Anderson all told Marty Harris at the National Information Infrastructure (NII), in writing, in 1994, what needed to be done, and were ignored. The fact that the US Government has been both ignorant and dishonest all these years about the total vulnerability of all SCADA (Supervisory Control and Data Acqusition) systems is not something that can be blamed on Anonymous.
1994 Sounding the Alarm on Cyber-Security
2011 Cyber-Command or IO 21 + IO Roots
Cofer Black: Hackers Evil, Pay Me… + Hackers RECAP
Cyber-Virus Proliferation: USG as “Main Enemy”
DefDog: Cyber-Command Can’t Find Ball…
DefDog: US Army Blows Intelligence Computing (Again)…
FBI Wages Its Own Cyberwar on Zombie PCs
Future of Information Operations (IO) — Potpourri
IMF: Cyber-Militia Flexing Its Muscles?
Gunnar Peterson on Robert Garigue’s Last Briefing
Journal: Army Industrial-Era Network Security + Cyber-Security RECAP (Links to Past Posts)
Journal: Cyber-Heist 2nd Generation
Journal: Information Security Seven Guiding Principles
Journal: Life in Industrial-Era Cyber-space–a Snap-Shot
Journal: Pentagon as VERY Slow Learner….
Journal: Reflections on Integrity UPDATED + Integrity RECAP
Journal: Strong Signals–Las Vegas as Next 9/11
Journal: US Public Health InfoTech NOT….
Journal: Who Controls (and Secures) the Internet?
Mario Profaca: US Lacks Cyber-Intelligence + RECAP
Reference: Advanced Cyber-IO (First Cut)
Reference: Bruce Schneier on Cyber War & Cyber Crime
Reference: Empire of Lies & Secrecy
Reference: Joe Nye on Cyber-Power
Review: Cyberpower and National Security
Robert Garigue & Robert Steele: From Old IO to New IO
Robert Garigue: Carleton University Research Page
Robert Garigue: Early Work on Information Warfare (1995)
Robert Garigue: Evolution of Cyber-Space
Robert Garigue: Feedback for Dynamic System Change
Robert Garigue: Information Security MANDATE
Robert Garigue on Advanced Information Operations
Robert Garigue: Role of the Chief Information Security Officer
Robert Garigue: Security as the Guarantor of Values Executed by Systems–Security as Truth & Trust
Robert Garigue: Security Services versus IT Processes
Robert Garigue: Standards Toward Interoperability
Robert Garigue: Strategic Evolution of Information Security
Robert Garigue: Structuring Risks (Role of Security)
Robert Garigue: The Evolving Role of the Chief Information Security Officer within the new structures of Information Systems
Robert Garigue: The New Information Security Agenda–Managing the Emerging Semantic Risks
Robert Garigue: The Next Long Wave of Innovation
Robert Garigue: Three Information Security Domains–the Physical (Old), the Process (Current), and the Content (Future)
Robert Garigue: Truth & Trust as Security Requirements
Robert Garigue: When Everything Else is Distributed….
Robert Steele: Ignored 1994, Ignored 2011–Deja Vu
Robert Steele: Secrecy, Self-Restraint, & Democracy Done in By Elites and “Experts”
Rules for Governing Cyber-Conflict
TDL-4 Rules–Industrial Era Governments Helpless
Search: Steele USMC C4I 1990′s
Undersea Cables: The Achilles Heel of our Economies
US Arms Industry Bleeding Secrets–This Is Not New
Who’s Who in Cyber-Intelligence: Robert Garigue