100% agree. Controls engineer designer here.
Keeping in mind that the US and Israel went after Iran's nuclear centrifuges by causing the Allen Bradley PLCs to malfunction and rapidly spin up and spin down, which broke the mechanism. This was done with a very sophisticated virus called Stuxnet. We've known that state actors had this capability for a very long time. But we also know that the source code for Stuxnet is now widely available and other actors have it. Hacking in and locking down an outdated system in a meat-packing plant or a pipeline would be child's play.
Not only that, they distributed the virus by placing it on flashdrives and seedung tge areas where the engineers hung out. Knowing that engineers sre curious and a little pervy, the were almost guaranteed that an engineer was going to pop it into his computer to see what was on it...
Provingvthat saftey protocols in industrial settings ate non existent. But fortunately they have learned and nothing like tgat will ever hapoen again.
Just kidding, the guys that get promoted are goid with gas, or electric, or uranium, or bullying workers - what ever that particular industry is They don't give a crap about network security - that is someone else's problem.
Yes, the virus itself was very intelligently written so that it could figure out where in the world (and where within the network) it was. Combined with the Human Firewall Element (TM) to break the sneakernet barrier, they did an amazing job with it.
Didn't want to get too technical for the layperson reading the comments, but you get it. :)
(post is archived)