Stuxnet development Paradigm Intel
Stuxnet Paradigm Intel
Stuxnet is a joint effort.
An extraordinary piece of professional craft.
Multi State craft.
The expertise required for this effort is remarkable.
Just assembling the required experts was a huge effort.
We have identified outside Uber hackers,
State hackers, nuclear experts, and using state of the art
programing/exploits/hacking.
This worm is based on past well tested and proven
malware fitted with unknown zero day exploits four of them.
One would have been sufficient.
It required experts with intimate knowledge of the nuclear systems.
The Teams were organized around these tasks.
#1) Penetration methods and vectors 4
#2) Worm, security, backdoors and reporting
#3) Controlling nuclear processes
#4) Fingerprinting exact targets
#5) Rootkit paradigms
#6) Security team for counter strike
#7) ARTIFICIAL INTELLIGENCE ENGINE
And NSA used outside Uber Hackers,
other State experts, Nuclear Scientists,
and pre-tested it over and over.
And maintained Opsec.
As we have said "the new
paradigms will be discovered
with in new contexts.
This opens a new era in
warfare in a new domain.
Hope they are ready for
the counter strike.
Its coming.
Iran doesn't have the craft
and won't have for years.
But there are others who
do.
But this shows that NSA is at the
top of the Game world wide,
and they learn from every attack
on US systems.
This deluxe combo relies on
old stand-bys and cutting edge
craft, and even 4 unknown zero
day exploits. The data they have
collected on this would fill several
blogs already, and there is a lot
more to reverse engineer.
There are Gov. guys out there
that are buying unknown zero
day exploits, I've talked to
one. He was interested in
our BSU's.
We are scanning for the application
of the "Law of Untended Consequence."
We may not see that until a counter
strike.
One nice "LUC" maybe the expulsion
of Abberjonny as Iranian President
from the discovery of Stuxnet.
Some of the file names are
very illuminating.
This surprised me, I knew it was
possible, but didn't think NSA
had the imagination, originality
or Guts to do it.
VERY IMPRESSIVE.
true masters of their craft,
on every level, well thought
out Paradigm, GENIUS.
This isn't the first one they've
done just the first discovered.
And they may have meant for it to
be found? ( At this point, most common
malware detection tools will detect this.)
top of the Game world wide,
and they learn from every attack
on US systems.
This deluxe combo relies on
old stand-bys and cutting edge
craft, and even 4 unknown zero
day exploits. The data they have
collected on this would fill several
blogs already, and there is a lot
more to reverse engineer.
There are Gov. guys out there
that are buying unknown zero
day exploits, I've talked to
one. He was interested in
our BSU's.
We are scanning for the application
of the "Law of Untended Consequence."
We may not see that until a counter
strike.
One nice "LUC" maybe the expulsion
of Abberjonny as Iranian President
from the discovery of Stuxnet.
Some of the file names are
very illuminating.
This surprised me, I knew it was
possible, but didn't think NSA
had the imagination, originality
or Guts to do it.
VERY IMPRESSIVE.
true masters of their craft,
on every level, well thought
out Paradigm, GENIUS.
This isn't the first one they've
done just the first discovered.
And they may have meant for it to
be found? ( At this point, most common
malware detection tools will detect this.)
Iran can get FUCKED very hard
if they mishandle this Nuke thing.
Gerald
Tactical Internet Systems analyst.
- Iran's future Nuclear program. NOT
- Iran wins one, Almost
- The new war domain at work.
- Cyber command confused maybe mislead.
- Stuxnet is not new.
- Iran, US go one step further for win
- Iran's secret Nuke.
abysssec Here is unpacked stub of stuxnet for fans http://bit.ly/czCqF7 password=abysssec #stuxnet Some files cannot be scaned? G
.
I
1 Comments:
Was he connected?
http://www.telegraph.co.uk/news/uknews/8024998/FBI-joins-investigation-into-MI6-spys-death.html
Stuxnet sample hides on usb disks
http://webcache.googleusercontent.com/search?q=cache:G4JRMWg8J48J:www.www.offensivecomputing.net/%3Fq%3Dnode/1604+74ddc49a7c121a61b8d06c03f92d0c13&cd=19&hl=en&ct=clnk&gl=us
If you go to Offensive computing and log in you can find "live - wild" samples for download-analysis.
http://www.offensivecomputing.net
Post a Comment
Subscribe to Post Comments [Atom]
<< Home