A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


SCADA: What the next Stuxnet will look like and how to prevent it - Joseph Bingham Derbycon 2019 (Hacking Illustrated Series InfoSec Tutorial Videos)

SCADA: What the next Stuxnet will look like and how to prevent it
Joseph Bingham
Derbycon 2019

In 2019, almost a decade after the famed Stuxnet worm silently wreaked havoc on an Iranian uranium enrichment plant, SCADA vendors still have gaping holes in their PLC and HMI development environments. Our new research into 7 different PLC vendor software systems details an almost negligent lack of security standards in modern SCADA environments. We will show a theoretical attack that could have happened using our recently discovered vulnerabilities and proof of concept code to disrupt a major power industrial system. We share our observations on vulnerabilities found in vendors across the board and mitigation techniques for using these required software in highly critical environments where even air-gapping is not enough to remove the threat of a remote attacker.

Before joining Tenable in 2014, Joseph worked at Symantec doing malware reverse engineering. Since joining Tenable as a reverse engineer, Joseph has produced several publications on malware, exploitation and reverse engineering.

@pneumagennao

Back to Derbycon 2019 video list

Printable version of this article

15 most recent posts on Irongeek.com:


    If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

    Copyright 2019, IronGeek
    Louisville / Kentuckiana Information Security Enthusiast