Recent Articles

Update Your System To Prevent DNS Exploits
HD Moore has released an exploit module for the Metasploit framework, meaning script kiddies and every other security person and wanna be is going to...

FCC Declares Comcast's Filtering Illegal
It's official, as far as the FCC is concerned, that Comcast's throttling of peer-to-peer traffic was illegal and in violation of the FCC's network neutrality principles.

EFF Launches Net Neutrality Tool
The Electronic Frontier Foundation has introduced a new tool that allows users to find out if their ISPs are throttling their P2P files. The new "Switzerland Tool" will reveal if a user's network connection has any...

SQL Server Upgrade Database Mirroring Issues
Before upgrading our production servers I simply removed the mirroring with the wizard. After the upgrade process the last step was to recreate the mirroring.


09.15.08

Hackers Attack The LHC

By Dan Morrill

The shiny new Large Hadron Collider has been hacked, with hackers taking over the Compact Muon Solenoid detector. The hacker group 2600 of the Greek Security Team has claimed responsibility.

While this is interesting, it shows some inherent flaws in some of the systems that run on commercial automation systems have been reviewed lately, and with the latest metasploit attack method for CitectSCADA systems the time to take a look at your commercial automation systems is now. While these might not be the glamorous systems, the idea of taking over something that has been built on commercial automation is something that should be part of any company's security plan. With the metasploit available, and with the proven hack at CERN for the LHC (Large Hadron Collider), the security issues in commercial automation software are something to take a look at.

The consequences of a breach, wrote Luders, "are inherent to the design of CERN's accelerators and the affiliated experiments. All run a variety of control systems: some of them are complex, some of them deal with personnel safety, and some of them control or protect expensive or irreplaceable equipment. Thus, CERN's assets and their proper operation are at stake." Source: ABCNews

Download Now

For many companies this is just going to be the tip of the ice berg, what is interesting is that it was not the Linux system that it runs on that was hacked. Rather the hackers went after a softer target going right into the control system. What makes this more interesting is that there is already enough worry that the system will build a miniature black hole that will consume the earth.

This kind of hack is not going to instill confidence that the folks at CERN are being as responsible as they should be when controlling such a large system with the hazard potential that the system has. This also has implications though for ITER the large fusion reactor that is being built in France as well because they are going to be using similar automation systems, and having a fusion reactor do things that are unexpected because of hackers is also not something that people are going to want.


About the Author:
Dan Morrill has been in the information security field for 18 years, both civilian and military, and is currently working on his Doctor of Management. Dan shares his insights on the important security issues of today through his blog, Managing Intellectual Property & IT Security, and is an active participant in the ITtoolbox blogging community.
About NetworkNewz
NetworkNewz editors, writers and contributors focus on both the big picture and the details of networking. At NetworkNewz our goal is to deliver to you The Key To Network Management.





NetworkNewz is brought to you by:

SecurityConfig.com NetworkingFiles.com
ITmanagementNews.com WebProASP.com
DatabaseProNews.com SQLProNews.com
ITcertificationNews.com SysAdminNews.com
LinuxProNews.com WirelessProNews.com
CProgrammingTrends.com ITmanagementNews.com





-- NetworkNewzis an iEntry, Inc. publication --
iEntry, Inc. 2549 Richmond Rd. Lexington KY, 40509
2008 iEntry, Inc. All Rights Reserved Privacy Policy Legal

archives | advertising info | news headlines | newsletters | comments/feedback | submit article


The Keys To Network Management Ask Questions in the Networking Forum NetworkNewz News Archives About Us Feedback NetworkNewz Home Page About Article Archive News Downloads WebProWorld Forums Jayde iEntry Advertise Contact