Тёмный

Stuxnet TED talk 10 years ago: What I got completely wrong 

OTbase
Подписаться 3,1 тыс.
Просмотров 13 тыс.
50% 1

In this video Ralph looks back at his TED talk in 2011 and points out what he got right, and what he didn't. For the latter he focuses on fears that Stuxnet could mark a new era of cyber war. But then we only saw very few, and mostly unimpressive attacks and attack attempts -- which have settled in an equilibrium of theatrical fear, with threat actors being actors more than actual threats.
Links:
Ralph's TED talk: www.ted.com/talks/ralph_langn...
Ralph's Stuxnet deep dive at S4x12: • Langner's Stuxnet Deep...
A timb bomb with fourteen bytes: www.langner.com/2011/07/a-tim...
Ralph's analysis of the cyber attack against Ukraine: • The most important les...
The Florida water hack: • Florida Water Hack
More Stuxnet material: www.langner.com/stuxnet/
#Stuxnet #OTsecurity #ICSsecurity

Наука

Опубликовано:

 

28 июл 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 28   
@brettweerasooriya3776
@brettweerasooriya3776 3 года назад
Great video Ralph. I’ve gone back and rewatched your Ted Talk more than a few times, as it was so interesting to me I was blown away by it.
@FutureCommentary1
@FutureCommentary1 Год назад
Here while reading 'This is how they tell me the world ends".
@orlandostevenson7214
@orlandostevenson7214 8 месяцев назад
Your work and prior talks, including one with NATO, led up to this enormous opportunity you landed and delivered on so well - even if it took some time for open source to connect the dots to confirm your assertions and, since then, gain additional big-picture perspective. The payload-related risk persists, as you point out, and the threat landscape continues to advance even with distracting theater, making sure the defensive capabilities starting with basics to address risk matters very much!
@digilux4017
@digilux4017 2 года назад
Thanks, Ralph
@threadtapwhisperer5136
@threadtapwhisperer5136 Год назад
Always a good thing to re-asses our past findings, no mattet the contexts. Let's dig in, learn me something!
@Ucfahmad
@Ucfahmad Год назад
I understand the feeling of worthwhileness for doing just a 10 minute talk - the topic certainly deserves much more than that to present. It may not have been clear back then, but stuxnet was a major event in history in both the areas of cybersecurity as well as warfare. Documenting and reporting on such things is important for the benefit of both present and future society.
@OTbase
@OTbase Год назад
well you can watch my enhanced 40 min version ("The Stuxnet story") on this very channel
@Ucfahmad
@Ucfahmad Год назад
@@OTbase In fact I already did so right after typing that comment
@ericpa06
@ericpa06 2 года назад
First of all great TED Talk, and great analysis video. As far as I understand your main takeaway after these 10 years is that is that the whole situation isn't as dangerous as you imagined it would be, that apparently hackers can't do THAT much harm as you considered? If I was able to understand your main point... Do you think that this will keep being the case in the future? Cause, more and more things are connected to the internet, and there is more and more microchips being put into everything and more and more devices running some sort of software. I mean, people talk about pilotless planes in the future. I see more and more opportunities for bad agents to do something horribly remotely as the time goes by. What if Stuxnet was just the beginning, and this would be child's play compared to the cyber attacks that will happen in the future or cyber attacks that could happen in the future...
@OTbase
@OTbase 2 года назад
You captured my main point accurately. Anything can happen in the future, especially in 100 something years. But this possibility does not relate to what we have (or have not) seen during the last decade, and what is likely to happen within the next decade.
@jimshorts0
@jimshorts0 3 года назад
Genuine question: How can we be sure that there wasn’t/isn’t a cyberwar but it’s very subtle / silent and the targets still don’t know what’s happening? It’s very possible that stuxnet may never have been discovered (and therefore most likely remained a covert operation and unknown publicly) if it wasn’t for the later, more aggressive, versions of it released.
@OTbase
@OTbase 3 года назад
That's a matter of definition. In my opinion the Stuxnet campaign should be considered as cyber war because it's about attacking a designated military target.
@kestasjk
@kestasjk 2 года назад
If you cant notice a war it’s probably not much of a war
@josiahz21
@josiahz21 2 года назад
@@kestasjk Not that it’s all doom and gloom, but didn’t notice the rats were carrying a bug until people started dropping like flies during the Black Plague. All that keeps nukes at bay is corrupt politicians promises on paper. Cyber security is no different imo. House of cards as they say.
@anfo_4241
@anfo_4241 3 года назад
Hello Mr Langner, have you put these thoughts into a company report or paper please?
@OTbase
@OTbase 3 года назад
No. That was just a spontaneous ramble.
@AdmV0rl0n
@AdmV0rl0n 3 года назад
I was working at an un named company in this timeframe. The company used siemens PLC, step 7 on engineer laptops, a not entirely distant thing (at least at first) from the basic story. Theatre automation moves very large objects around, and puts actors on cable - flying them. So, an automation platform going bezerk and running outside of safe coded workload could prospectively kill people. Ralph, and the researchers did enough work that it became clear it was a specific targetted attack. It did leak, but IMHO that was more the windows components that were party on that. I'm probably wrong here in suggesting (and how dare I!) that I am unsure that I agree with Ralph's current view. I don't think many people using the gear have fundamentally got better at the security around it. I don't think funding has been better. I question if in a general sense wether security and posture has got better. I would say that its harder to some degree to create the worm piece via the windows engineer laptop part of the puzzle. So there is that. But even there, as with in Florida, many municiple and governmental infrastructure pieces are really quite under funded, under manned, and under skilled. I am also unsure about the trolling part. In terms of Ukraine, that did not stop in Ukraine. It really walloped some orgs like Maersk. gvnshtn.com/maersk-me-notpetya/ So, do we have the hackers, the bunker kids and the troll artists. Yes. In this, Ralph is right. And in one way, PLCs are... kinda ... well, boring to a kid in the bedroom. But, I also take it this way. If Ralph really considered that he and his team could generate a 14 byte code release, and he (IMHO) rightly concluded not to release as this would lead to real consequences - then we should remain vigilent. And I say that because IMHO, the world cyber war did not cool off between the talk and now. I'd rather say that - if we look at the US in the last two weeks - in regard to Microsoft Exchange - that the cyber war now has larger 'armies', targets, and 'arguments'. If there was only one super power then, I'd argue it is at least contested/multi polar now. The Iranians, The terror cells, the Chinese, The Russians, The North Koreans, Criminals, Ransom ware creators - all of these forces are on the move, and seeking targets. That remains why I hold Mr Langer's original concern back at TED as a real thing, and as much as what we see is trolling, this doesn't equate to only trolling tomorrow... I do share his happiness that things did not get as ugly as was perhaps possible, and for that I will always be thankful. Thank you for your time as always Mr Langer. I sincerely appreciate it!
@superola01
@superola01 2 года назад
I don't get it; what would have been the use of the first version if it never was going to be used but just stayed hidden forever in the Natanz plant?
@OTbase
@OTbase 2 года назад
The first version was used. And it stayed in the later code (though de-activated) because the attackers wanted the world to see it.
@kestasjk
@kestasjk 2 года назад
@@OTbase Do you think they definitely wanted the world to see? Wasn't there code references to compile locations etc, text that referenced the project name as some middle-eastern flower etc? It could just be sloppiness, maybe at some point it was using both payloads at the same time?
@kestasjk
@kestasjk 2 года назад
I'm not saying they minded the world seeing or were trying to hide it, if so they could have done better there, just not sure if they wanted it out there. Natanz was still operating at the time, they only closed it off after it was made public right?
@luka6341
@luka6341 2 года назад
Also verstehe ich das richtig: Stixnet hat nur die Uran Anreicherung in Natanz betroffen oder alle Anreicherungsstandorte in Iran?
@SogMosee
@SogMosee 2 года назад
So the US built the first version of stuxnet alone, then israel helped on the second version?
@OTbase
@OTbase 2 года назад
Correct
@OTbase
@OTbase 2 года назад
Another way to put it is: The US built the first version of Stuxnet, and Israel fucked it up in the second version. See my video "The Stuxnet Story".
@7eis
@7eis Год назад
Comment about sympathy for Ukraine didn't age all too well 😅
@imagingconcepts
@imagingconcepts 8 месяцев назад
I still find it hard to believe that Stuxnet was a first, if it truly was, that means that mankind created an extremely sophisticated product that worked perfectly right out of the box… it clearly must be Alien. ;)
@OTbase
@OTbase 8 месяцев назад
It was well tested on Lybian centrifuges of the same model, and it didn't work perfectly...
Далее
The Stuxnet Story: What REALLY happened at Natanz
37:38
Dissecting Stuxnet
17:41
Просмотров 148 тыс.
ЭТОТ ПЕНЁК ИЗ PLANTS VS ZOMBIES - ИМБА!
00:48
Langner's Stuxnet Deep Dive
1:03:38
Просмотров 66 тыс.
The moment we stopped understanding AI [AlexNet]
17:38
Просмотров 791 тыс.
Is Skynet watching you already?
1:04:00
Просмотров 1 млн
Zero days - Security leaks for sale | VPRO Documentary
48:44
Why Hacking is the Future of War
31:45
Просмотров 2,5 млн
How Cyberwarfare Actually Works
20:53
Просмотров 3 млн
10 МИНУСОВ IPHONE 15
18:03
Просмотров 38 тыс.
ЗАБЫТЫЙ IPHONE 😳
0:31
Просмотров 19 тыс.