Langner says it isn't a bug, so don't expect vendor patches-- details on Stuxnet research #cyber #stuxnet #langnercommunications
From Ralph this morning: (bolding by your humble editor)
From the press release from Langner Communications:
From the release:
The Washington Post is reporting that a senior defense department official, William J. Lynn III, writing in Foreign Affairs magazine has declassified and disclosed a cyber attack on US Government (military) computers and networks propagated by a USB stick, loaded onto a US military laptop in the Middle East in 2008.
Finally, something Joe Weiss and I have been talking about, begging for, and even shouting about for several years in this blog has come to pass. I personally am delighted to see Lofty Perch beginning to see the importance of forensics.
According to the Channel Insider blog, Microsoft has released an out-of-band patch (MS10-046) that attempts to repair the .LNK vulnerability that has been used to attack Siemens S7, PCS7 and WinCC-based HMI systems.
From Mike Krampe at Siemens:
OK, faced with the Siemens vulnerability, which could have been anybody else's vulnerability just as easily, what should we do?
Just received from Michael Krampe, spokesman for Siemens Industry:
Just to be clear, this is Walt Boyes here.