Digital Bond

For Secure & Robust ICS

  • Home
  • Consulting
  • S4x18
    • S4x18 Call For Presentations
    • S4x18 Sponsor Packages
  • Dale Peterson
  • Hire Dale To Speak
  • Contact Us

Langner’s Stuxnet Deep Dive S4 Video

January 31, 2012 by Dale G Peterson 12 Comments

Ralph Langner’s Stuxnet Deep Dive is the definitive technical presentation on the PLC attack portion of Stuxnet. He did a good job of showing very technical details in a readable and logical presentation that you can follow in the video if you know something about programming and PLC’s.

The main purpose of Ralph’s talk was to convince the audience with “100% certainty” that Stuxnet was designed specifically to attack the Natanz facility. He does this at least four different ways, and I have to agree there is no doubt.

This video represents exactly what we are trying to accomplish at S4. Ralph is speaking in front of a very experienced and knowledgeable ICS security audience, and he doesn’t waste any time on what Stuxnet 101. Instead, he dives right into the S7 code and walks the audience through, line by line, some of the most interesting FC’s. This level of detail has never been seen before. It likely would bore or be lost on most audiences, but the S4 crowd was spellbound.

[vimeo 35806770]

It’s high quality video so expand to full screen to see the code.

The video shows the level of effort Langner’s team put into analyzing Stuxnet as there comments are throughout the S7 Stuxnet code. Many in the audience remarked that it was probably much better documented than the Stuxnet author’s version.

I’m tempted to try to excerpt the most interesting points of the presentation, but if you want to know about Stuxnet’s PLC code you should just watch it.

Can’t resist; I found

  • encryption routine in the wrapper with hard coded key
  • the mysterious DB 8061
  • all of the Natanz numerology
  • the strike condition
  • FC 6065 manipulate outputs, FC 6079 replay recorded data
  • Design flaws not vulnerabilities, “this is how the pro’s do it”
  • Zero chance of Stuxnet working without a test facility

and much more fascinating even after a second viewing.

Filed Under: S4, Siemens, Stuxnet Tagged With: PLC Hacking, Ralph Langner, S4, Stuxnet

Comments

  1. Sihoko says

    February 2, 2012 at 07:05

    Thx for posting the video. Very interesting and convincing, so now thevtarget is more or less confirmed… But from a forensic aspect it would be nice to confirm who is behind the attack.

  2. Frank Ch. Eigler says

    February 23, 2012 at 16:45

    The 100% certainty seems to assume that coincidence of certain numbers is unique to Natanz. Is there some evidence that other UF6 enrichment installations use strictly different parameters?

  3. Mike Mischke says

    February 23, 2012 at 22:09

    The following countries are known to operate enrichment facilities: Argentina, Brazil, China, France, Germany, India, Iran, Japan, the Netherlands, North Korea, Pakistan, Russia, the United Kingdom, and the United States.

    There’s only two real enemies on that list. That narrows it down a bit.

  4. Richard Steven Hack says

    February 23, 2012 at 23:03

    When one considers the number of countries infected by Stuxnet, and where the concentration of infection was, and then consider who really has the technical capability to both produce such a weapon AND has a problem with one or more of the countries infected, you are reduced to two countries: the US and Israel.

    Clive Robinson over at Bruce Schneier’s blog thinks North Korea was the ultimate target, with Iran as the backdoor due to contact between the two countries. I doubt that because even with that sort of contact between the two countries, introducing Stuxnet into North Korea would be an order of magnitude more difficult than introducing it to Iran. I don’t recall any reports of infection in North Korea precisely because of that isolation.

    And Israel doesn’t care about North Korea.

    So the fact that the Stuxnet data structures match almost exactly to the cascades in Natanz pretty much seals the deal.

    You would have to find similar layouts of cascades in other countries that were infected by Stuxnet AND be able to point to an enemy of those countries who would have the technical ability to produce Stuxnet to make a case for any other target.

    Pakistan vs India? Doubtful. China vs India? Possibly. More likely than the US and Israel vs Iran? Doubtful. A global attack on all enriching nations – or even all Muslim nations with nuclear facilities? Possible but doubtful.

    I think the case is made that either or both Israel and the US targeted this toward Natanz – possibly as a trial run against other enriching countries, but certainly against Iran.

  5. Jim K says

    February 24, 2012 at 18:52

    One alternative I have heard of:

    If you wanted to dry run a SCADA attack against western industry, who better to attack than Iran, when all fingers will immediately point elsewhere?

    Wheels within wheels…

  6. Mykola says

    February 27, 2012 at 19:49

    I agree with Mr. Eigler: I think there is not enough evidence that the main aim was Natazi. I am not an expert in nuclear engineering, but very often the same purpose leads to about the same (optimal) design. It means that many enrichment facilities around the world may share about the same configuration. This view, in particular, may explain the extraordinary complexity of attacking condition: authors wanted to deal with more than one plant in the same code. If this is the case then instead of act of war we have here an attempt to sabotage global uranium supply. And that leads to the very different game.

    I repeat: this could be the case iff numerology, revealed in the video, is not unique for Natazi. I would love to hear from experts on the topic.

  7. Jimstonefreelance says

    February 28, 2012 at 18:32

    It’s pretty obvious, with ALL of the pressure release valves at Fukushima sticking shut via a powered command even with operators trying to vent, and the fact that Israel published the fact that a team from Dimona had a full time data link into the Fukushima reactor rooms all the way through the disaster, that something is fishy there.

    Fukushima needed no power to remain safe, the real emergency backup systems are powered by reactor steam, and will activate unless a direct command from the controller tells them not to.

    Why did they not activate?

    Think about that.

  8. Michael says

    March 2, 2012 at 16:03

    Hello Jimstone,

    I wonder if nuclear research centers are into intelligence gathering, planning, and executing also.

    Michael

  9. oslodi says

    March 7, 2012 at 12:25

    stuxnet digits pry into illoculars that undeniably echo into a cyber zone of Iraq. Nuclear spindle controller are Siemens PLC at 164 centrifuges with group enrichment. Possible use with open source available are nuclear waste processors of China, warhead launchers of India, Pakistan or N. Korea and so on. Not interesting but down right scary.

  10. Khalid says

    November 21, 2012 at 14:01

    The video is no longer available at the provided link as of 21st Nov. 2012:

    http://vimeo.com/35806770

    Could you please upload it again? Or, point to an alternate location where it is available?

  11. Dale Peterson says

    November 21, 2012 at 14:42

    Sorry about that. Something changed in the site / vimeo / wordpress. We will fix it.

    In the meantime you can see all the S4 2012 videos at Digital Bond’s S4 2012 Video Channel, http://vimeopro.com/user10193115/s4-2012

Trackbacks

  1. Sanctions, Iran and Arms Transfers « DogmaDrift says:
    January 18, 2013 at 23:58

    […] encourage support for overt military intervention against its nuclear sites (as opposed to the rather creative, clandestine, low-level warfare being carried out for many years now), let us give the benefit of […]

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Subscribe to the S4 Events YouTube Channel

S4x18 Stats: 447 people from 25 countries
Thanks to all Attendees, Speakers & Sponsors

Follow S4 Events on Facebook

Tools & Talks

DNS Squatting and You

DNS Squatting and You

February 24, 2016 By Reid W 3 Comments

Basecamp for Serial Converters

Basecamp for Serial Converters

October 30, 2015 By Reid W 3 Comments

escar Asia

escar Asia

September 9, 2015 By Dale Peterson 1 Comment

Unsolicited Response Podcast: Cyber Insurance

Unsolicited Response Podcast: Cyber Insurance

August 27, 2015 By Dale Peterson 3 Comments

S4 Events Newsletter

Subscribe to our newsletter on leading / bleeding edge ICS cyber security information and S4 Events.

* indicates required
Email Format

Dale's Tweets

About Us

Digital Bond was founded in 1998 and performed our first control system security assessment in the year 2000. Over the last sixteen years we have helped many asset owners and vendors improve the security and reliability of their ICS, and our S4 events are an opportunity for technical experts and thought leaders to connect and move the ICS community forward.

Recent Comments

  • Engineer on Five Draft ISA99 / IEC-62443 Standards
  • Chris on Koyo/Automation Direct Vulnerabilities
  • Brandon Workentin on The ICS Security Stories We Tell And Love
  • Joe Weiss on Insanely Crowded ICS Anomaly Detection Market
  • Stuart Bailey on Unsolicited Response Podcast Is Back … With John Matherly of Shodan

Search….

Follow @digitalbond

Copyright © 2018 Digital Bond. - All Rights Reserved ·