Bitcoin Forum
May 01, 2024, 09:42:25 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 [2]  All
  Print  
Author Topic: Stuxnet and bitcoin...  (Read 2765 times)
iluvpie60
Hero Member
*****
Offline Offline

Activity: 700
Merit: 500


View Profile
November 12, 2014, 06:41:09 PM
 #21

Why are you posting something so stupid? Honestly, can you give us a real answer on why you felt the need to disappoint so many people in this forum today?

Stuxnet lol....
If you see garbage posts (off-topic, trolling, spam, no point, etc.), use the "report to moderator" links. All reports are investigated, though you will rarely be contacted about your reports.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1714599745
Hero Member
*
Offline Offline

Posts: 1714599745

View Profile Personal Message (Offline)

Ignore
1714599745
Reply with quote  #2

1714599745
Report to moderator
1714599745
Hero Member
*
Offline Offline

Posts: 1714599745

View Profile Personal Message (Offline)

Ignore
1714599745
Reply with quote  #2

1714599745
Report to moderator
1714599745
Hero Member
*
Offline Offline

Posts: 1714599745

View Profile Personal Message (Offline)

Ignore
1714599745
Reply with quote  #2

1714599745
Report to moderator
Vessko
Full Member
***
Offline Offline

Activity: 139
Merit: 100



View Profile
November 13, 2014, 08:52:59 AM
 #22

My understanding of Stux is that it had a powerful basic core

Well, it depends how you define "powerful". It was one big mess of a code. Built from a framework of modules. A mouse built to government specifications.

Quote
that included at least two zero day exploits.

Four, if I remember correctly.

Quote
That is rare and why I consider it to be sophisticated.

Yeah, well, attacking a country's uranium enrichment equipment is unusual too, but that doesn't make the virus particularly sophisticated. Maybe I'm just biased, having seen so many really sophisticated tricks in viruses over the last quarter of a century... I still think that as a virus (i.e., as self-replicating code) Stuxnet was nothing special, no matter what else the code did.

Quote
This basic code was then elaborately modified to target specific hardware.

No, it wasn't modified. It was designed to do so from the get-go.
Flashman
Hero Member
*****
Offline Offline

Activity: 518
Merit: 500


Hodl!


View Profile
November 13, 2014, 11:04:23 AM
 #23

Really, it was the oldskool "walking disk drive" hack applied to centrifuges.

TL;DR See Spot run. Run Spot run. .... .... Freelance interweb comedian, for teh lulz >>> 1MqAAR4XkJWfDt367hVTv5SstPZ54Fwse6

Bitcoin Custodian: Keeping BTC away from weak heads since Feb '13, adopter of homeless bitcoins.
Hazard
Legendary
*
Offline Offline

Activity: 980
Merit: 1000



View Profile WWW
November 13, 2014, 02:13:53 PM
 #24

Not a chance

RodeoX
Legendary
*
Offline Offline

Activity: 3066
Merit: 1145


The revolution will be monetized!


View Profile
November 13, 2014, 09:44:40 PM
 #25

A PLC attacking worm with 4 zero day exploits is not sophisticated? I have to disagree. By the way, I don't think that the actual stuxnet code is a danger to bitcoin. But the idea of a malicious attack with similar code could be. Imagine if it were programed to find bitcoin ASICs. 

The gospel according to Satoshi - https://bitcoin.org/bitcoin.pdf
Free bitcoin in ? - Stay tuned for this years Bitcoin hunt!
Vessko
Full Member
***
Offline Offline

Activity: 139
Merit: 100



View Profile
November 14, 2014, 10:49:02 AM
 #26

A PLC attacking worm with 4 zero day exploits is not sophisticated? I have to disagree.

Then we'll have to agree to disagree. Have you actually analyzed the Stuxnet code? How many other computer viruses have you analyzed? Just trying to establish a basis of comparison here, you see.

I've been analyzing viruses since 1989. I've seen some pretty incredible things. Viruses that did not reside in any file or boot sector, or, in fact, anywhere on the disk (CodeRed). Viruses that resided in the unused disk space of the last cluster of the file (Number of the Beast). Viruses that infected directories, instead of files (Dir_II). Viruses that hid into unused areas of zeroes in the infected file (Lehigh). Viruses that hid in the header of the infected EXE files (TheRat) or even optimized that header in order to shorten it and free up space for themselves (Phoenix). Viruses that compressed the infected files (Cruncher). Viruses that infected the master boot sector by changing just one byte in a data area (Starship). Viruses that didn't save the original boot sector anywhere and performed its function themselves, instead. Viruses that infected documents (Concept) or spreadsheets (Laroux) or JPEG images (Perrun). Viruses that were just 29 bytes long (Trivial). Viruses that had cryptographically protected payload, so that we still don't know what they were supposed to do (Gauss). Viruses that infected multiple fundamentally different platforms, like both Windows and Linux, or Windows, MacOS and Android. Viruses that rewrite themselves to look different every time they replicate (V2P6). Viruses that chopped their own code into many parts and spread them all over the infected file (Commander_Bomber). Viruses that brute-forced their own encrypted code (i.e., didn't contain the decryption key) in order to slow down anti-virus products that use emulation (RDA_Fighter). And so on, and so on...

Compared to some of the stuff I've seen, a virus that is a humongous mess of code and replicates via USB sticks doesn't rate as "sophisticated", even if it uses 4 zero-day exploits, attacks unusual hardware configurations, and was used as a weapon against a nation-state.

But then I'm probably just biased. For most common people probably even just the ability to replicate makes a program "sophisticated"...
RodeoX
Legendary
*
Offline Offline

Activity: 3066
Merit: 1145


The revolution will be monetized!


View Profile
November 14, 2014, 04:25:42 PM
 #27

A PLC attacking worm with 4 zero day exploits is not sophisticated? I have to disagree.

Then we'll have to agree to disagree. Have you actually analyzed the Stuxnet code? How many other computer viruses have you analyzed? Just trying to establish...

That was a nice write-up. I have not truly analyzed any virus. But what I mostly see in the wild are simple script kiddy versions of well known viri. Perhaps we do not disagree so much. The examples you noted are very complex viri and compared to those stux is not so special. But it must be in the top percentile compared with viri in general?

The gospel according to Satoshi - https://bitcoin.org/bitcoin.pdf
Free bitcoin in ? - Stay tuned for this years Bitcoin hunt!
Flashman
Hero Member
*****
Offline Offline

Activity: 518
Merit: 500


Hodl!


View Profile
November 14, 2014, 04:36:10 PM
 #28

Well it seems to me that stuxnet was a tailored threat, aimed at systems of somewhat known configuration, whereas your generic virus has to proliferate on a number of wildly varying configurations that may have commonalities, but are different. Ergo, those have to be "smarter".

Now, a tailored threat for bitcoin mining? Well maybe you could take out KNC's operation or something, given enough intel about it, but different ASICs different mining programs, different OSes, different CPU instruction sets even (cgminer has been compiled for MIPsel, ARM, x86...) ... well let's just say it might have to be AI complete rather than merely smart to take out more than 50% and then it's only temporary disruption.

TL;DR See Spot run. Run Spot run. .... .... Freelance interweb comedian, for teh lulz >>> 1MqAAR4XkJWfDt367hVTv5SstPZ54Fwse6

Bitcoin Custodian: Keeping BTC away from weak heads since Feb '13, adopter of homeless bitcoins.
Vessko
Full Member
***
Offline Offline

Activity: 139
Merit: 100



View Profile
November 15, 2014, 12:49:47 PM
 #29

Well it seems to me that stuxnet was a tailored threat, aimed at systems of somewhat known configuration

Yup. It didn't attack just any SCADA system. It didn't even attack just any SCADA system made by Siemens. It attacked a SCADA system made by Siemens that was used to control industrial regulators in a very specific configuration. We had an inkling that Iran's uranium enrichment facility was the target, but we had no proof. After all, we couldn't go to the Iranians and ask them "Hey, buddy, does your uranium enrichment setup happen to have this particular configuration of industrial controllers?". Until a colleague found an image on the site of the Iranian president, depicting his visit to the uranium enrichment facility:



See that computer screen in the foreground (the left one)? It's the screen of a PC controlling the centrifuges. The image on the screen shows graphically the configuration of the controllers - and it matched exactly the one Stuxnet was looking for.

As another colleague of mine joked once, we call this "open source intelligence". Grin

Quote
whereas your generic virus has to proliferate on a number of wildly varying configurations that may have commonalities, but are different. Ergo, those have to be "smarter".

Ah, not really. If you read what I've written so far on this subject, you might notice that I said that Stuxnet was not very sophisticated as a virus. There is a reason why I used this specific phrase. You see, most people equate "virus" with "damaging program". This is ignorant at best. A virus is a self-replicating program. While it is true that the mere act of self-replication tends to cause damages of various kind, it is important to note that a virus doesn't have to be intentionally destructive, in order to be a virus. It can do nothing else besides replicating - and will still be a virus. The opposite is also true - a malicious program, no matter how destructive, is not a virus if it lacks the ability to replicate itself.

So, when I say that a virus is sophisticated, it means that it has a clever and unusual self-replication mechanism - or at least some clever mechanism for hiding its spread. Stuxnet had nothing of the sort. Stuxnet had a sophisticated payload - but for me what a virus does besides replicating is pretty much irrelevant. The self-replicating property is what classifies a program as a virus, so this is what is important to me when analyzing one.
Flashman
Hero Member
*****
Offline Offline

Activity: 518
Merit: 500


Hodl!


View Profile
November 15, 2014, 01:15:00 PM
 #30

Shame the photog didn't aim a bit lower, coulda got the password on the post it note on the bottom of the monitor too Cheesy

TL;DR See Spot run. Run Spot run. .... .... Freelance interweb comedian, for teh lulz >>> 1MqAAR4XkJWfDt367hVTv5SstPZ54Fwse6

Bitcoin Custodian: Keeping BTC away from weak heads since Feb '13, adopter of homeless bitcoins.
mistercoin
Legendary
*
Offline Offline

Activity: 1042
Merit: 1000


https://r.honeygain.me/XEDDM2B07C


View Profile WWW
November 15, 2014, 03:39:48 PM
 #31

In theory, anything is possible. But probable ? Nope. Grin

mistercoin
Legendary
*
Offline Offline

Activity: 1042
Merit: 1000


https://r.honeygain.me/XEDDM2B07C


View Profile WWW
November 15, 2014, 03:41:24 PM
 #32

Well it seems to me that stuxnet was a tailored threat, aimed at systems of somewhat known configuration

Yup. It didn't attack just any SCADA system. It didn't even attack just any SCADA system made by Siemens. It attacked a SCADA system made by Siemens that was used to control industrial regulators in a very specific configuration. We had an inkling that Iran's uranium enrichment facility was the target, but we had no proof. After all, we couldn't go to the Iranians and ask them "Hey, buddy, does your uranium enrichment setup happen to have this particular configuration of industrial controllers?". Until a colleague found an image on the site of the Iranian president, depicting his visit to the uranium enrichment facility:



See that computer screen in the foreground (the left one)? It's the screen of a PC controlling the centrifuges. The image on the screen shows graphically the configuration of the controllers - and it matched exactly the one Stuxnet was looking for.

As another colleague of mine joked once, we call this "open source intelligence". Grin

Quote
whereas your generic virus has to proliferate on a number of wildly varying configurations that may have commonalities, but are different. Ergo, those have to be "smarter".

Ah, not really. If you read what I've written so far on this subject, you might notice that I said that Stuxnet was not very sophisticated as a virus. There is a reason why I used this specific phrase. You see, most people equate "virus" with "damaging program". This is ignorant at best. A virus is a self-replicating program. While it is true that the mere act of self-replication tends to cause damages of various kind, it is important to note that a virus doesn't have to be intentionally destructive, in order to be a virus. It can do nothing else besides replicating - and will still be a virus. The opposite is also true - a malicious program, no matter how destructive, is not a virus if it lacks the ability to replicate itself.

So, when I say that a virus is sophisticated, it means that it has a clever and unusual self-replication mechanism - or at least some clever mechanism for hiding its spread. Stuxnet had nothing of the sort. Stuxnet had a sophisticated payload - but for me what a virus does besides replicating is pretty much irrelevant. The self-replicating property is what classifies a program as a virus, so this is what is important to me when analyzing one.

Does anyone else think that ahmadinejad is charismatic? In an evil, taking over the world, type of way?

Flashman
Hero Member
*****
Offline Offline

Activity: 518
Merit: 500


Hodl!


View Profile
November 15, 2014, 03:53:05 PM
 #33


Does anyone else think that ahmadinejad is charismatic? In an evil, taking over the world, type of way?

How's his maniacal laugh? Does he monolog? Does he have a white persian cat? ... oh nvm, we can buy him one.

TL;DR See Spot run. Run Spot run. .... .... Freelance interweb comedian, for teh lulz >>> 1MqAAR4XkJWfDt367hVTv5SstPZ54Fwse6

Bitcoin Custodian: Keeping BTC away from weak heads since Feb '13, adopter of homeless bitcoins.
Pages: « 1 [2]  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!