Recent comments in /f/Documentaries
TibotPhinaut t1_j4kfy1k wrote
Reply to comment by charleswj in Zero Days (2016) - Stuxnet, a piece of self-replicating computer malware that the U.S. and Israel unleashed to destroy a key part of an Iranian nuclear facility, and which ultimately spread beyond its intended target. [01:53:51] by Missing_Trillions
So as long as all of those don't give them up Iran shouldn't either. Right?
charleswj t1_j4kermt wrote
Reply to comment by TibotPhinaut in Zero Days (2016) - Stuxnet, a piece of self-replicating computer malware that the U.S. and Israel unleashed to destroy a key part of an Iranian nuclear facility, and which ultimately spread beyond its intended target. [01:53:51] by Missing_Trillions
Yes, and let Russia and the UK and France and Israel and India and Pakistan and North Korea keep theirs because they'll surely disarm right after us
hawkxp71 t1_j4kdl52 wrote
Reply to comment by TibotPhinaut in Zero Days (2016) - Stuxnet, a piece of self-replicating computer malware that the U.S. and Israel unleashed to destroy a key part of an Iranian nuclear facility, and which ultimately spread beyond its intended target. [01:53:51] by Missing_Trillions
Why are you excusing the Dutch, German, British and Israeli foundations?
TibotPhinaut t1_j4kax9q wrote
Reply to comment by PhillipLlerenas in Zero Days (2016) - Stuxnet, a piece of self-replicating computer malware that the U.S. and Israel unleashed to destroy a key part of an Iranian nuclear facility, and which ultimately spread beyond its intended target. [01:53:51] by Missing_Trillions
How's all that prosecution of US war crimes in Afghanistan, Vietnam and Iraq coming along?
TibotPhinaut t1_j4katqn wrote
Reply to comment by hawkxp71 in Zero Days (2016) - Stuxnet, a piece of self-replicating computer malware that the U.S. and Israel unleashed to destroy a key part of an Iranian nuclear facility, and which ultimately spread beyond its intended target. [01:53:51] by Missing_Trillions
And war is the very foundation of the US, so everything is good
kerbaal t1_j4k8vj7 wrote
Reply to comment by Fatal_Taco in Zero Days (2016) - Stuxnet, a piece of self-replicating computer malware that the U.S. and Israel unleashed to destroy a key part of an Iranian nuclear facility, and which ultimately spread beyond its intended target. [01:53:51] by Missing_Trillions
I don't expect it to happen; concepts of justice like that everyone is equal under the law and that the law exists to restrict the government as much as it does us are not popular with people who only want us to be a country of laws when its convenient for them.
kerbaal t1_j4k8m40 wrote
Reply to comment by UsecMyNuts in Zero Days (2016) - Stuxnet, a piece of self-replicating computer malware that the U.S. and Israel unleashed to destroy a key part of an Iranian nuclear facility, and which ultimately spread beyond its intended target. [01:53:51] by Missing_Trillions
> In an attempt to stop a terrorist state getting nuclear weapons.
also known as refining their own ore for nuclear power. I have seen no evidence other than the claims of mealy mouthed politicians that they had a weapons program at that time.
kerbaal t1_j4k8j39 wrote
Reply to comment by Raudskeggr in Zero Days (2016) - Stuxnet, a piece of self-replicating computer malware that the U.S. and Israel unleashed to destroy a key part of an Iranian nuclear facility, and which ultimately spread beyond its intended target. [01:53:51] by Missing_Trillions
We already have nuclear weapons in the US.
JiraSuxx2 t1_j4k4n5r wrote
Reply to comment by my7bizzos in Zero Days (2016) - Stuxnet, a piece of self-replicating computer malware that the U.S. and Israel unleashed to destroy a key part of an Iranian nuclear facility, and which ultimately spread beyond its intended target. [01:53:51] by Missing_Trillions
Will check it out. Thanks.
tygghb t1_j4k3xcu wrote
Reply to comment by Why_Did_Bodie_Die in Zero Days (2016) - Stuxnet, a piece of self-replicating computer malware that the U.S. and Israel unleashed to destroy a key part of an Iranian nuclear facility, and which ultimately spread beyond its intended target. [01:53:51] by Missing_Trillions
Software exploits that are "brand new" (ie. that the general public did not previously know about). Once an exploit is publically known about, the companies usually work quickly to patch them. They are therefore rare and highly sought after by bad actors.
The going rate is about $100,000 each on the dark web. When a bad guy writes malware, they typically use one zero-day exploit, maybe even two.... but to have NINE or whatever Stuxnet had, is unheard of and was a tell-tale sign that the software was created by a nation-state since the average bad guy is not going to spend $900,000+ to write their malware.
faux_glove t1_j4k1nxx wrote
Reply to comment by CupResponsible797 in Zero Days (2016) - Stuxnet, a piece of self-replicating computer malware that the U.S. and Israel unleashed to destroy a key part of an Iranian nuclear facility, and which ultimately spread beyond its intended target. [01:53:51] by Missing_Trillions
What would a fuzzer do, then?
charleswj t1_j4k0o72 wrote
Reply to comment by TheImmortalIronZak in Zero Days (2016) - Stuxnet, a piece of self-replicating computer malware that the U.S. and Israel unleashed to destroy a key part of an Iranian nuclear facility, and which ultimately spread beyond its intended target. [01:53:51] by Missing_Trillions
>Absolutely is not. Most intelligence departments, Department of justice, homeland etc all have some departments with air gapped machines for security reasons.
This is actually not true except in some edge cases. Most of the "air gapped" networks are actually only logically separated. For example DOD's NIPR (often referred to as the "low side") is their version of what most companies have, the network most directly connected to the internet, as well as the DREN (for research and development). No classified data is allowed here.
But they also have other networks, sometimes referred to as the "high side" (i.e. SIPR, JWICS), where classified data (Secret and Top Secret, respectively) can be stored. It's a common misconception that these are air gapped, but they're actually more like a VPN on top of NIPR. Additionally, there are various "gateways" (i.e. DOTS, Cross Domain Enterprise Email Service) to allow limited communication and data transfer between low and high sides.
TheImmortalIronZak t1_j4jvgft wrote
Reply to comment by charleswj in Zero Days (2016) - Stuxnet, a piece of self-replicating computer malware that the U.S. and Israel unleashed to destroy a key part of an Iranian nuclear facility, and which ultimately spread beyond its intended target. [01:53:51] by Missing_Trillions
Absolutely is not. Most intelligence departments, Department of justice, homeland etc all have some departments with air gapped machines for security reasons. They can never be “hacked” or the like due to that. And as for the Iranian governments uranium enrichment center the air gapped machine’s control all aspects of the enrichment process, the centrifuges, etc for the same reason.
Burdekin_Boy t1_j4jv36w wrote
Reply to comment by 80burritospersecond in Zero Days (2016) - Stuxnet, a piece of self-replicating computer malware that the U.S. and Israel unleashed to destroy a key part of an Iranian nuclear facility, and which ultimately spread beyond its intended target. [01:53:51] by Missing_Trillions
Yeah Estops into PLCs should only really be for signal/logging. Stand-alone safety relays should be in use.
TheImmortalIronZak t1_j4juz8i wrote
Reply to Zero Days (2016) - Stuxnet, a piece of self-replicating computer malware that the U.S. and Israel unleashed to destroy a key part of an Iranian nuclear facility, and which ultimately spread beyond its intended target. [01:53:51] by Missing_Trillions
Yeah dude/dudette, Stuxnet was absolutely insane!! It was straight out of a spy novel or something. The NSA/CIA broke their backs trying to find a way to hit the Iranian process plant, then their wishes were granted due to finding a propaganda video of the plant along with high res footage of their control system on monitors as well as noticing a piece of hardware that controlled the timing. 2 days later they had a full report detailing all the running programs as well as testing to trigger the piece of hardware that controlled the on/off times. Even with the Iranian plant having air gapped systems (when your main cpu isn’t connected to the internet to maintain strict security), all they had to do was send a small ass bug all around the world which would eventually make its way to Iran & then would attack other systems until it told the “auto stop hardware” instead of running for 20 minutes at 1700 rpm it would run for 45 minutes at 3500 rpm which would literally explode all of their centrifuges which ruined whatever uranium was being processed as well as making all the machines completely useless.
Ps the goddamn IDF has always been so damn jumpy & rush everything which causes 💩 to go down. Again, goddamn that was an absolutely intense documentary.
so_futuristic t1_j4jrpzb wrote
Reply to comment by Why_Did_Bodie_Die in Zero Days (2016) - Stuxnet, a piece of self-replicating computer malware that the U.S. and Israel unleashed to destroy a key part of an Iranian nuclear facility, and which ultimately spread beyond its intended target. [01:53:51] by Missing_Trillions
software vulerabilities that are unknown but to the people exploiting then
Why_Did_Bodie_Die t1_j4jpsi7 wrote
Reply to comment by muerto1964 in Zero Days (2016) - Stuxnet, a piece of self-replicating computer malware that the U.S. and Israel unleashed to destroy a key part of an Iranian nuclear facility, and which ultimately spread beyond its intended target. [01:53:51] by Missing_Trillions
I know almost nothing about computers. I remember in the documentary they made this seem pretty significant. Can you tell me a little about what a zero day is and why it is so significant? Are they really hard to do/make/get? Maybe EILI5.
Rockhard_Stallman t1_j4joj5m wrote
Reply to comment by WNKYN31817 in Zero Days (2016) - Stuxnet, a piece of self-replicating computer malware that the U.S. and Israel unleashed to destroy a key part of an Iranian nuclear facility, and which ultimately spread beyond its intended target. [01:53:51] by Missing_Trillions
I would say it makes you stand out more. Not that anyone is going to believe it really is, but someone that knows about Stuxnet likely has cooler stuff to poke around on than the person with SSID “Netgear781” or “Grandma”.
hamburglin t1_j4jnrce wrote
Reply to comment by CupResponsible797 in Zero Days (2016) - Stuxnet, a piece of self-replicating computer malware that the U.S. and Israel unleashed to destroy a key part of an Iranian nuclear facility, and which ultimately spread beyond its intended target. [01:53:51] by Missing_Trillions
Thank you. Not sure what this guy has been smoking but he's got some type of imaginary cyber security world built in his head.
hamburglin t1_j4jmx0p wrote
Reply to comment by abitrolly in Zero Days (2016) - Stuxnet, a piece of self-replicating computer malware that the U.S. and Israel unleashed to destroy a key part of an Iranian nuclear facility, and which ultimately spread beyond its intended target. [01:53:51] by Missing_Trillions
... autorun... exploits? (I'm going to pretend that's a term in the cyber security and forensics industry that actually makes sense to continue on here). In any context that has anything to do with being relevant about getting into air gapped networks? You sure you know what you're talking about?
You then reference the use of a fuzzer in a highly targeted attack? Wth? You think they're going in there and potentially bluescreening machines and trying "best guesses" at what they need to do to perform command and control operations? That would have already been known before deploying their malware and tools.
Safe to say even if you worked there then you still don't know what you're talking about.
ramriot t1_j4jkwt9 wrote
Reply to comment by danderskoff in Zero Days (2016) - Stuxnet, a piece of self-replicating computer malware that the U.S. and Israel unleashed to destroy a key part of an Iranian nuclear facility, and which ultimately spread beyond its intended target. [01:53:51] by Missing_Trillions
That scenario sounds pretty preposterous. Remember this was a remote secure compound. Where one key feature of their security is the air-gapped network.
Does it sound at all possible for someone to first wander onto the Natanz facility, second drop things around people's cars, & then third have those people with access to the centrifuge hall & who know how important the sanctity of the internal network is to just insert a random thumb drive?
That said it was likely a usb drive, but one designed to pass stringent inspection that came from a trusted source & was needed to update internal software.
danderskoff t1_j4jisth wrote
Reply to comment by ramriot in Zero Days (2016) - Stuxnet, a piece of self-replicating computer malware that the U.S. and Israel unleashed to destroy a key part of an Iranian nuclear facility, and which ultimately spread beyond its intended target. [01:53:51] by Missing_Trillions
I believe I heard somewhere it got into the facility from USB drives that were dropped in the parking lot near employee cars
MissionarysDownfall t1_j4jio4f wrote
Reply to comment by ramriot in Zero Days (2016) - Stuxnet, a piece of self-replicating computer malware that the U.S. and Israel unleashed to destroy a key part of an Iranian nuclear facility, and which ultimately spread beyond its intended target. [01:53:51] by Missing_Trillions
They absolutely did describe both those things. The weird graphic woman even swore about the Israelis f-big everything up by being overly aggressive.
TibotPhinaut t1_j4kfzta wrote
Reply to comment by hawkxp71 in Zero Days (2016) - Stuxnet, a piece of self-replicating computer malware that the U.S. and Israel unleashed to destroy a key part of an Iranian nuclear facility, and which ultimately spread beyond its intended target. [01:53:51] by Missing_Trillions
I don't even know what you are trying to say at this point