Langner's Stuxnet Deep Dive

Поділитися
Вставка
  • Опубліковано 18 січ 2025

КОМЕНТАРІ • 83

  • @BillKinsman
    @BillKinsman 4 роки тому +63

    This is the most fascinating piece of code that I have ever heard of. The authors had access to the most detailed information that there is and so much confidential information from so many vendors that it has to be state-sponsored.

    • @S4Events
      @S4Events  4 роки тому +5

      Glad you enjoyed it!

    • @notme4526
      @notme4526 2 роки тому +7

      It's all but been directly admitted by our security community because there clearance won't allow them to admit it publicly, though a lot of people involved or that over seen it basically admitted too it years ago. Even Obama got shocked on stage an said he couldn't speak about it when he was asked, notice he didn't say they weren't involved lol so he didn't lie, just that he could speak about it. On top of the fact that only governments would want to do this, any financially motivated group would have no interest in attacking Iran or investing the money to reverse the Siemens hardware, there was little to no research on this hardware back when stuxnet was used unlike now where there is much more public analysis and research of these products available online.

    • @randomnessslayer
      @randomnessslayer 3 місяці тому

      @@notme4526 *their *overseen *to *and *couldn't
      The last sentence is wild speculation, a gut feeling, and practically/logically speaking it lacks imagination. IF there is enough money (Premise) on the line, a FINANCIALLY MOTIVATED group IS motivated to do whatever will make them a boatload of money (Conclusion: I mean ... DUH; opportunity to make "enough" money + financial motivation => do the thing to collect the money)
      Google: corporate espionage/sabotage 😒 (e.g. British East India Company and Chinese Monopoly on Tea [billions of USD in today's money] and Volkswagen and Poaching of Opel Executives [one of the biggest settlements in industrial espionage in the modern era - 100 million in cash + 1 billion in bought car parts over 7 years] are the two biggest that come to mind)

    • @KushLemon
      @KushLemon 2 місяці тому +2

      Everybody knows it's Israel.

    • @MrTehkaiser
      @MrTehkaiser 2 місяці тому

      ​@@KushLemon Global Supreme Leader KushLemon casually commenting in a random UA-cam video. You speak for the entire planet sir, please get back to work. There's important things that need your attention.

  • @jacobreuter
    @jacobreuter 2 роки тому +19

    Absolutely my favorite explanation. I was looking for a deeper dig into the code such as this instead of the super dramatized videos with edits.

    • @S4Events
      @S4Events  2 роки тому +5

      Yes. We point to this as an example of a great S4 Stage 2: Technical Deep Dive session for new Stage 2 speakers. Lots of technical meat that drives to a point. It has had over 50K views on UA-cam, and for the first five years was on Vimeo. BTW, 60 Minutes came down to film footage of Ralph giving this session.

  • @BillKinsman
    @BillKinsman 4 роки тому +30

    Absolutely, the Field Engineer's worst nightmare! Trying to figure out why the rotors were failing must have been keeping some people awake at night.

    • @spacegerrit9499
      @spacegerrit9499 3 роки тому +7

      Engineers got killed, reprimanded by management, fired and whatnot. Stuxnet had a huge impact on, not just machinery, but peoples lives.

  • @ArztvomDienst
    @ArztvomDienst Рік тому +5

    "Countdown to ZeroDay" made me come here. Fascinating talk!

  • @udirt
    @udirt 2 місяці тому

    no idea how i missed that talk, it was incredible. i think the extreme precision is about predictability, they wanted to know when something happens, when it will happen the next time, etc. so they could have the option of planning with it, i.e. to know when a tech would be required etc.

  • @skilz8098
    @skilz8098 23 дні тому

    These are some of the things that we tend to overlook when it comes to any kind of system or device that is connected to and powered by some type of electrical power grid. First, you cannot stop the signal. You might be able to divert it, redirect it, transform it, but you cannot completely stop it. Voltage and current has to flow somewhere, and there's always some type of power draw. Otherwise, it wouldn't be a circuit.
    From there, then it's a generalization of understanding the devices and systems that are built on top of that power grid, electrical circuit system. From there it's just a matter of finding the schematics - blueprints - patent filings, etc. of said device. From there, anyone who understands how to read them, can easily reverse engineer the device without even having to have a physical device on hand.
    There's always going to be actors on both sides of the fence, and there's no know system to be 100% secure. However, we can take measures to mitigate those vulnerabilities as much as possible.
    The thing is when it comes to any type of computational devices such as a computer with a CPU/GPU etc. the entire binaries which includes, instructions, data, memory locations, etc. at the end of the day are really just representations of numbers in the form of electrical signals. It's a house of cards where every single bit is one of those cards. The card is either standing or it is not. The bit is either set or it is not.
    Regardless of ethical concerns, I do have to say, that this type of attack vector was well thought out, well planned, and yet even in some fashion a bit respectful. The reason I say a bit respectful is that it did not seek to "destroy or cause massive loss of life" it was specifically targeted to control specific devices to cause minimal and controlled damage. In some ways I can partially respect it from the perspective of an engagement on a battlefield. This was one hell of a chess move!
    And as we can see the discovery of this system back in 2010 and here in 2024 almost 2025 nearly 15 years later is still being highly studied. We'll be learning about this for the next 50-100 years. This is as about as historical as the deciphering and reverse engineering of the Enigma machine during WWII.

  • @CristobalRuiz
    @CristobalRuiz 5 років тому +15

    I wonder who gave thumbs down? This is a great presentation.

    • @shreddagorge
      @shreddagorge 4 роки тому +21

      Maybe some Iranians... ;-)

    • @PIFFthePUFF420
      @PIFFthePUFF420 3 роки тому +3

      Maybe Mossad doesn't like you exposing their work

    • @tobalaba
      @tobalaba 3 роки тому +3

      Mossad, NSA, or Langner competitors.

  • @JeandrePetzer
    @JeandrePetzer 2 роки тому +1

    28:45 Which dots is he talking about here? His laser pointer isnt showing up on the video? The bottom image doesnt have the missing dots that the first two real scada screens had

  • @AdamGreenhill
    @AdamGreenhill 8 років тому +11

    Is there a report or a writeup that details this? I would love to read this in PDF format

    • @S4Events
      @S4Events  8 років тому +33

      Langner's definitive work on Stuxnet is "To Kill A Centrifuge" www.langner.com/en/wp-content/uploads/2013/11/To-kill-a-centrifuge.pdf

    • @AdamGreenhill
      @AdamGreenhill 8 років тому +3

      S4 Events thanks!

  • @invntiv
    @invntiv 8 років тому +17

    Very fascinating talk from one of the few people who were embroiled in understanding the stuxnet attack. Would love to here from Andrew Chien from Symantec as well. Langber, Chien, and many other involved were featured the brilliant 2016 documentary "Zero Day" by Alex Gibney. I urge those interested in forensics, security, or really any other STEM field to check it out

    • @invntiv
      @invntiv 8 років тому +1

      *** Eric Chien from Symantec

    • @asswhole4195
      @asswhole4195 4 роки тому +1

      Check out the book "Countdown to Zeroday"

  • @aajas
    @aajas 2 місяці тому

    56:28 An interesting counterpoint to the "different approach" is the CrowdStrike bug that shut down all the airports in july 2024.
    Because creating qualified images became a big pain, updates were delivered as data running like bytecode
    Sure it was not a "targeted attack" in the same sense, but it had the effect as one

  • @tammyroyce8013
    @tammyroyce8013 Рік тому +1

    Batch files are most commonly known to be in the system part C

  • @tammyroyce8013
    @tammyroyce8013 Рік тому +1

    The configuration system of the batch file

  • @ig_jr_Area52
    @ig_jr_Area52 3 роки тому +1

    Thanks for sharing this outstanding presentation!

  • @chadkrause6574
    @chadkrause6574 4 роки тому +5

    It seems very obvious that this was an inside job of some sort. The amount of information required to pull these attacks off is stunning. There had to be a team of people working on this

    • @ErebuBat
      @ErebuBat 3 роки тому +4

      Not an inside job, but espionage. This is what the CIA does.... get info like this.

    • @spacegerrit9499
      @spacegerrit9499 3 роки тому +1

      Dutch secret service was involved aswel. Apparantly the physical usb insertation was done by an AIVD mole.

    • @Evanderj
      @Evanderj 3 роки тому +2

      The NSA can get inside practically anywhere in the world remotely. They had full access to the software on the system, the cctv, the whole network including the personal devices of many who worked there- thanks to Mossad for providing info & identities on those individuals.
      How intelligent and creative the NSA is… is just mind blowing- couple that with virtually unlimited funding.

    • @ArztvomDienst
      @ArztvomDienst Рік тому +3

      Siemens was involved, they even build a functional sandbox cascade to recreate the real world conditions of the target, as Ralph says, even with the UF6

    • @rafts02
      @rafts02 3 місяці тому

      Don’t forget unit 8200 joining in

  • @allurbase
    @allurbase 2 роки тому

    the numbers in red are censores for the video?? huh

  • @GeorgeTsiros
    @GeorgeTsiros 7 місяців тому

    I like how the decompiled code still uses windows type names: BOOL DWORD etc

    • @foansmusic5603
      @foansmusic5603 2 місяці тому

      These are common data types in S7 im pretty sure

    • @CastleHassall
      @CastleHassall 2 місяці тому

      i imagine it's easier to stay anonymous if there's no personality to the code

  • @ArztvomDienst
    @ArztvomDienst Рік тому

    Love the HB Gary reference! XD

  • @tammyroyce8013
    @tammyroyce8013 Рік тому +1

    How about stuxnet. And I I came out and I put and I open changed in Google speaker system that has been changed in the program itself because the program itself is actually written Google docs system to be exact

  • @douro20
    @douro20 8 років тому +2

    So when will we have Felix Lindner's talk?

    • @S4Events
      @S4Events  8 років тому

      Felix was ill and sent hadez in his place. We are putting up two talks a week, so sometime in the next few weeks.

  • @iGrave
    @iGrave 3 роки тому +3

    44:30. Unfortunately there are "valid" reasons inputs could be writable. When testing code, it's common practice to put simulation routines to emulate plant equipment. It doesn't have to be complicated, oftentimes it's just reflecting an output "run" signal to a "running" input. For various reasons, it's desirable to write as close to raw input as possible.
    To be clear this code should 'never' make it to production, and if forgotten would typically be removed during commissioning. It's only something you'd ever see during dev, or perhaps for a digital twin/training rig.
    But hell. This sort of intentional exploit is just straight up not something I've never seen considered Even to this day.
    Spoken as a process control engineer with about 10 years experience across various industries.

    • @iGrave
      @iGrave 3 роки тому +1

      Couple follow-ups from the q and a.
      I'm assuming old-mate at 55:10 ish is referring to what I mentioned above. I agree with the host here, I have never come across a situation where writing to the input tables is required *in production*. And for my example above, I have to doubt there is a solution the vendor could implement to allow us engineers for our sim purposes.
      I will disagree with the host about the authors of Stuxnet having an exact physical replica. Again, machines operate in predictable ways, which allows us to write sim code. If you see a run signal, put in some small delay, then reflect it back to the running input. The run speed feedback can ramp to the run speed setpoint according to some ramping rules.
      How machines and processes interact is more complicated, but I'm sure someone with a strong understanding of how a centrifuge cascade works could predict how the target plant would respond.
      Having a physical reproduction certainly wouldn't hurt though :)

  • @wanderingfido
    @wanderingfido 7 років тому

    I wished someone had asked if they thought it was possible to consider a compromise where the input process image was not made immutable until the driver factory(s) were initialized at install-time. Oh well.

  • @lagimmediafiles6478
    @lagimmediafiles6478 5 років тому +4

    The Code is C++? Or Java Script?

    • @lagimmediafiles6478
      @lagimmediafiles6478 5 років тому

      @Eduardo Souza whats that?

    • @hyperfine3633
      @hyperfine3633 5 років тому +2

      I thought it was largely written in C (with some assembly bit-fiddling)?
      Surely it would be almost impossible to keep track of a program this large writing just in an assembly language.
      Edit: Just seen the part about the C-style pseudo code. This is probably what I've seen before so I assumed it was mostly C code.

    • @moose43h
      @moose43h 4 роки тому

      @Eduardo Souza no it was written in c and c++

    • @aslannoah9835
      @aslannoah9835 3 роки тому +6

      @@moose43h The language is called SCL or Structured Text(ST). It is a PASCAL based language that's used for programming Programmable Logic Controllers

    • @OTbase
      @OTbase 3 роки тому +7

      Folks, the high level code samples are translations from SCL to a C-like language in order to understand how the code is structured and what they intend to achieve. Those snippets were created manually and usually required a couple of days of work per SCL module (or function block/FB in Siemens parlance).

  • @VacuumFluctuation
    @VacuumFluctuation 2 роки тому +1

    It's wired to see even after 6 years S4 Events could not upload a proper FHD video of such a presentation as if it just does not matter.... Not sure what to call it - Arrogance or Carelessness?

    • @S4Events
      @S4Events  2 роки тому +4

      I'm sorry about that. We did not record it that way back in 2012, so this is the best quality we have. Back then it was 60 people in a small room with a single, simple camera. Now the Main Stage is a 4 camera shoot with a lot more emphasis on staging and other elements for the video. I too regret we don't have a higher quality video. So of your two choices, carelessness back during the recording is the answer.

    • @VacuumFluctuation
      @VacuumFluctuation 2 роки тому

      @@S4EventsI was so disappointed 5 days ago, i hope we had tech to upgrade the video atleast to 480p.
      But I do understand your response. Thanks for the reply.

    • @alexbenzie6585
      @alexbenzie6585 Рік тому

      Why would it be arrogance you mug

  • @angelabetts7359
    @angelabetts7359 6 років тому +5

    My master sent me here. ;)

  • @24thelder72
    @24thelder72 3 роки тому +1

    Shoot Don't Tell Us Nuclear Power Generation Use Read/Write Logic In Their Control System Design For Cooling. kdagPlymouthUK. Please Stay Blessed. GodBless S4.

  • @mrhassell
    @mrhassell 3 місяці тому +1

    “They know everything!” - But, they don't know C++ very well. 🤣

    • @mrhassell
      @mrhassell 3 місяці тому

      But it's true, as Ralph said; These are just design flaws. (as amusing as using loops, when struct/assert, may be preferred, speed, security, whatever…) The funny mistakes, as plentiful as they were, make no mistake, it worked.

  • @elimgarak3597
    @elimgarak3597 3 роки тому +4

    6:48 geez, I guess Amazon and Google should stop using Apache, Spark, Nginx, Postgres, MongoDB, Linux, Bash, and other non-professional open source tools then. Boomer comment on an otherwise very cool talk.

    • @josefaschwanden1502
      @josefaschwanden1502 3 роки тому

      How tf are these tools not professional?

    • @elimgarak3597
      @elimgarak3597 3 роки тому +1

      @@josefaschwanden1502 I know right? I don't know why the speaker would imply that a tool is not professional because it is open source.
      BTW, I hope they upstreamed their enhancements with a pull request. Otherwise, a very dick move.

    • @josefaschwanden1502
      @josefaschwanden1502 3 роки тому +2

      @@elimgarak3597 he didnt imply that open source means bad quality, but that this specific open source project was. Atleast thats how i understood it.

    • @urnan7499
      @urnan7499 3 роки тому

      He never implied that open source means bad quality. He's referring to the open source decompiler that he used to decompile StuxNet. Professional anti virus companies use commercial tools like IDA Pro to decompile executables.

    • @elimgarak3597
      @elimgarak3597 3 роки тому +1

      @@urnan7499 "we had to make a couple of enhancements BECAUSE it is open source and not really professionally mantained". Ofc he is implying open source means bad quality, that is clear as water.

  • @tammyroyce8013
    @tammyroyce8013 Рік тому +1

    Did you check under stuxnet. EXE

  • @tammyroyce8013
    @tammyroyce8013 Рік тому +1

    Stuxnet.exe
    Stuxnet.ini
    Stuxnet.rar