Quantcast
Channel: Submarine & Other Matters
Viewing all articles
Browse latest Browse all 2347

Ransomeware Threat to SSBNs' Microsoft "Windows for Submarines"

$
0
0
At work at the NSA where cyber-defensive software is assessed and developed and also malware. 
---

Combining the current international ransomware scare and nuclear missile submarines (SSBNs) is the following:

GLOBAL RESEARCH ARTICLE

Graham Vanbergenfor Canada based Global Research, May 14, 2017 reportsin part:

“British Nuclear Submarines, Microsoft and That Ransomware Attack”

[The BBC has reported that the recent ransomware attack hit 100 countries. Cyber-security firm Avast said it had seen 75,000 cases of the ransomware worm– known as ‘WannaCry’ and variants of that name – around the world. The ransomware worm parasitically spreads by itself between computers with alarming speed and effectiveness. So fast, that this cyber-attack had the potential to hit critical infrastructure that supports human life and disable it.] “Microsoft was[and is] the only fully vulnerable operating system...”

"“Who are culprits? The BBC blame hackers known as ‘The Shadow Brokers’, who made it freely available in April, saying it was a “protest” about US President Donald Trump... The NSA in America lost all of these hacking tools, specifically the one that caused this attack and subsequent mayhem across the world. The hackers exploited a piece of NSA code known as “Eternal Blue.”...This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.”
From a 2008 article by The Registerreported:
“[Britain’s Vanguard class SSBNs use Microsoft’s Windows for Submarines] The programme is called Submarine Command System Next Generation (SMCS NG), and uses varying numbers of standard multifunction consoles with two LCD screens, hooked up on an internal Ethernet network installed on each sub. Initial reports as the programme developed suggested that the OS in question would be Windows 2000, but those who have worked on it have since informed the Reg that in fact it is mostly based on XP.”

Windows were so chuffed at “Windows for Submarines” they even advertised the fact to the entire world (HERE)

“Windows for Submarines is the programme undertaken by the Royal Navy and BAE Systems to equip the nuclear-propelled and nuclear-armed warship fleet with a Windows-based command system.  The transition to the Windows for Submarines command system on HMS Vigilant, a Trident nuclear missile submarine, was completed in just 18 days.”

PETE’S COMMENT
The ransomware used in this current crisis may have been adapted by well organised hacker networks from the almost decade old Stuxnet worm:
Stuxnet functions by targeting machines using the Microsoft Windows operating system and networks...
Stuxnet became most famous in 2010 for causing thousands of centrifuges (used for boosting levels of  bomb-grade Uranium-235) to spin erratically and destructively at Natanz and other Iranian sites.
The three country organisations that may have Stuxnet were the US NSA and Israel’s Unit 8200 with Middle Eastern and Iranian targets in mind. 
All developed countries have their NSA equivalents, including Russia (FSB-IT but mainly GRU-IT) and China (including PLA Unit 61398 within the broader PLA Third Department). 
Pete

Viewing all articles
Browse latest Browse all 2347

Trending Articles