The true story of The Amazing, Money Making Widget…

Wednesday, October 6, 2010

Risk of computer viruses to systems NZ, warns expert

The virus targets Siemens supervisory control and data acquisition (Scada) systems. Photo / AP

Companies of New Zealand must be running it systems that might be infected with the virus Stuxnet "very concerned", says an it security specialist Australian.

The virus-addressing systems (Scada) of supervisory control and data acquisition Siemens-was first identified in June.

However, Iranian State media reported Monday that the virus had mutant and causing extensive damage to industrial equipment in Iran, where they had been infected 30,000 IP addresses. "What was once a theory, in terms of criminals, being able to control the physical plant and equipment, is now a reality, "said Steve Martin, a Director at Symantec internet security companies based on Sydney.

Martin said SCADA systems were commonly used to control "critical infrastructure" such as pipelines, power plants, oil refineries, dams and production facilities.

The virus could potentially take a dam and its floodgates open, he said.

A spokesperson for Mighty River Power, which runs the power generating dams on the Waikato River, said his Siemens control systems were not susceptible to the virus Stuxnet.

"We are not running Windows 2000, either, that we need to understand is the port for the virus," said the spokesperson.

Martin said that although there was 60 percent Stuxnet attacks in Iran, New Zealand companies using systems that might be infected should remain vigilant to the threat.

Most of the control systems have been connected to the Internet, which meant that the virus was entering them via USB sticks that previously had been used in infected personal computers, he said.

Martin said that companies should take measures to limit the number of people who could get access to a control system with a USB stick.

It infected PCs appeared simply acted as host and have not been damaged by the worm Stuxnet said.

"The sophisticated malicious code is at a level that we've never seen written before malicious code. it is estimated that it took up to 10 people over six months to write." Is worrying enough.

Martin said that the virus had already spread beyond Iran, India, South Korea and Indonesia.

Hamid Alipour, Deputy Chief of Iran's Information Technology Company, was reported as saying those behind the creation of huge virus would have enjoyed "investment" from foreign countries or organizations.

Martin said that those who have written the virus would require access to expensive control systems to test it.

Iranian officials have denied that first nuclear installation of the Islamic Republic, in Bushehr, was between the plants penetrated by the virus.

A spokesperson for Siemens said that after notification of the virus, the holding a tool for detection and removal provided to customers within seven days.

"By the beginning of August, Microsoft closed the breach of security of the operating system that it meant that the virus is no longer could infiltrate any installation with Microsoft update patches."

-further alert AFP

By Christopher Adams | Email Christopher

View the original article here

No comments:

Post a Comment