this post was submitted on 21 May 2024
496 points (98.4% liked)

Technology

59600 readers
3365 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 1 points 6 months ago (1 children)

state actors have hacked airgapped equipment before, an actual backdoor will be ripe for exploitation.

[–] [email protected] 1 points 6 months ago (1 children)
[–] [email protected] 4 points 6 months ago* (last edited 6 months ago) (1 children)

remember the stuxnet botnet, and how nobody knew what it was for?

turns out it was programmed to activate in the very specific conditions inside the iranian nuclear reactor facilities and sabotage it. the facility was airgapped but stuxnet was so ubiquitous in the country by then, someone just needed to bring the first usb stick in for it to be a pwn. or so goes the story.

iirc the us and israel admitted to doing it years later, it was somewhere in the obama era and they wanted to sabotage iran's nuclear program. the systems remained infected for years reporting bogus data and slightly messing with the parameters so it never worked well and their scientists remained stumped until the virus was discovered.

shows how vulnerable our systems really are to organizations with unlimited money.

[–] [email protected] 1 points 6 months ago (2 children)

Yeah... and now the Iranians have Stuxnet, too.

[–] [email protected] 2 points 6 months ago

i'd be surprised if stuff like it werent way more common today.

[–] [email protected] 1 points 6 months ago (1 children)

So? Those backdoors have been closed since 2010 (probably earlier). Also not too many people have an Iranian Nuclear program.

[–] [email protected] 5 points 6 months ago

The experts don't share your optimism.

In the same report, Sean McGurk, a former cybersecurity official at the Department of Homeland Security noted that the Stuxnet source code could now be downloaded online and modified to be directed at new target systems. Speaking of the Stuxnet creators, he said, "They opened the box. They demonstrated the capability... It's not something that can be put back."

Dealing with Stuxnet has probably advanced Iranian cyberwarfare capablilites by several orders of magnitude that they wouldn't have otherwise. That's the problem with using this stuff as weaponry - they don't explode.