Advertisement
Guest User

Untitled

a guest
Jun 26th, 2019
191
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.28 KB | None | 0 0
  1.  
  2. Contrary to common belief 'Malware' was not created by either a man or woman named Mal (Melissa/Malcolm).
  3.  
  4. 'Malware' is termed that was because it is the shortening of Malicious Software. Di-spite furious campaigning by Apples Steve Jobs to rename this an Application(App) the name has stuck, where as others have fallen.
  5.  
  6. The common cause for a program to be labeled 'malicious' is often the intent of the developer; however their are common cases of a well intended Program having unintentional malicious components >see Windows 10:
  7.  
  8. Symptoms of 'malicious software' often includes:
  9.  
  10. *Sending personal information to third party's. With/Without the users full consent. (Often under the guise of "further assisting development of future projects")
  11.  
  12. >financial assistance is somehow a reasonable excuse for something you have already payed for in full.
  13.  
  14. *Encrypting the devices Data Banks and asking for a financial exchange in order to obtain the decryption key. (note this has not been a issue on Linux devices. their was an attempt, however if you can figure out how to install and run Linux you are more than qualified to obtain the key lazily left embedded within it's code.)
  15.  
  16. *And general destruction/corruption of files and folders.(This can be unintentional/sloppy software design, or some 12 year old trying to hack you face book using 2 different Aim hack scripts they obtained for CS:GO, copy pasted together under the file name of 1337H4X05.exe).
  17.  
  18.  
  19.  
  20. You may have heard of some pretty important event's in 'Malwares' history in recent years. (chances are you didn't, Put down the phone and watch some damn Television once in a while. Did you know Propaganda was legalized in the USA in 2012?).. didn't think so. Anywho,
  21.  
  22. *Stuxnet 2010-2012 (if anyone happens to have a copy I'm in the market for it)
  23.  
  24. This is a form of 'Malware' with a sub group of "Worm/Computer Worm", Unlike other types of 'viruses' it is a stand alone operation. Not requiring it to be attached/attacked to an existing document/Program to be executed and preforming tasks.
  25.  
  26. "Worms"are often self replicating and will 'bury' them selves into Documents/Data likely to be forwarded to other systems (depending on how ingenues the writer was. This can be a very large and smart program by virus standards with high levels of data compression/mathematical know how, rumored worms have been <500kb but open to >150mb)
  27.  
  28. The worm Stuxnet was originally* used by "Team America World Police" to enforce its will upon unsuspecting Iranian organizations engaged in the peaceful production of Enriched Uranium.
  29.  
  30. Normal methods of delivering this 'virus/worm' would not be effective in this case.(turns out Iranians really don't want to press the big red button for a free apple iphone 4).
  31.  
  32. The assistance of Microsoft was enlisted, But this was no simple task as the Iranians were using another contractor for its supervisory control and data acquisition (SCADA) (AKA electronically controlled and monitored systems) Siemens (LEWD)
  33.  
  34. This is where the advantage of worms come in. Microsoft (you know that company that you should trust not to plant malicious software in your OS? 'At-least Game Apps tell you that they are going to rip all you data for profit' and make you pay for the privilege) Was able to plant into Siemens 'Secure' Network using a thing called mutual trust(see social engineering), A single* copy of this worm Stuxnet, was injected into an update that was required to be loaded During the final stages of processing, a billion dollar project which could not be paused.
  35.  
  36. Siemens uses Isolated computing for their high security manufacturing needs(Note* Pine Gap "Australia's highest security ""secrete""communications facility" isolates its systems TOTALLY, being that no off site power is used, and no out side drives are allowed in. Power line Networking it's a thing!).
  37.  
  38. Their is always that one flaw in all off grid systems is the inevitable need to update.(Did you enjoy your security update on Windows 10? More ads yay!) Bill Gates being the ever popular cause of Modern Software Consumerism, saw no ethical deficiency in allowing this 'Malicious code' to be passed on by his company, MERICA! (shekels may have changed hands)
  39.  
  40. Now that the 'Worm' had a efficient path to infecting the critical software, that controls the expensive high speed centrifuges used in the enrichment of uranium. it was only a matter of time for the code to take effect, literally.
  41.  
  42. By design Stuxnet is a "time bomb" attack. It will lay dormant for a given amount of time until the coders preferred moment of activation. By delaying the execution of the 'main intent' the coder ensured that their code went without detection for it to have the greatest potential for success.
  43.  
  44. The coder clearly knew what sort of system they were attacking. This is evident by the 'obfuscation protocol' that was implemented along side the 'main intent'. The first wave of attack was the subtle adjustment of the digital readouts indicating what RPM (speed the spinners spun) the centrifuges were running at. This was done over the course of approximately one year. Making the secondary precaution measure worthless. being that of manual speed calibration.(supply power was increased in a way that it was not recorded as a problem, statistical deviation)Whilst the(Siemans) system was designed with computer error in mind(computer only has X amount of speed control); it was not thought that a base load power increase of over 25% would not cause suspicion with the caretaker engineers that there may be a cumulative error with the readouts.
  45.  
  46. With the culminate error Stuxnet is creating, it also adjusted the computers speed control to a lower positive setting, while maintaining the correct adjustments to RPM.
  47.  
  48. Now comes the moment of truth. This 'Worm' has put in place the very conditions it needs to have a catastrophic on the equipment.
  49.  
  50. >Machines are spinning over max capacity.
  51.  
  52. >Their is an additional 30% more power to throw into them.
  53.  
  54. So it did. All at once. Centrifuges spinning well past there safe operating limits. Ripping them selves apart like a brick in the dryer.
  55.  
  56. (if you are into Games you may of herd about Bloodbornes 'Memory leak' glitch. where people were playing for 12 hours straight and having no problem defeating the bosses, as they were reduced to a single move set.)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement