Beruflich Dokumente
Kultur Dokumente
Official communication
presented at CIP Seminar 02-11-2010
by Thomas Brandstetter
Highly The highly sophisticated malware Stuxnet was probably developed by a “team of
experts”, because of the required knowhow about IT, industrial controllers,
sophisticated
engineering skills and details about a specific project configuration
Malware outside Potentially transfers data into and out of the system – but this has not yet been
communication proven, especially as the target servers are down and not reachable
Malware gets into the system via various Microsoft vulnerabilities (now
fixed)
USB-Stick
Infection via USB / network / printer
apparently not active
Target Server
spooler
Microsoft
Operating System
fixed by Microsoft Patch
wraps S7-DOS
DLL
S7-DOS
DB 890
S7 / plc FC 1865, 1874
WinCC Details
Internal External
http://support.automation.siemens.com/WW/view/en/38616083/133300
http://support.automation.siemens.com/WW/view/en/26462131
Siemens AG
Speaker contact:
Thomas Brandstetter
Program Manager Hack-Proof Products
Siemens CERT
thomas.brandstetter@siemens.com