Johanna Faust, a mixed race Jew, prefers to publish pseudonymously. She is committed: first, to preventing war, ecological disaster, and nuclear apocalypse; last to not only fighting for personal privacy & the freedom of information, but, by representing herself as a soldier in that fight, to exhorting others to do the same. She is a poet, always. All these efforts find representation here: "ah, Mephistophelis" is so named after the last line of Christopher Marlowe's Dr. Faustus, whose heretical success flouted the censor for a time.

DHS warns of SCADA vulnerability; neglects to mention what it resembles or how closely | (the STUXNET files)




An electronic device used to control machinery in water plants and other industrial facilities contains serious weaknesses that allow attackers to take it over remotely, the U.S. Industrial Control Systems Cyber Emergency Response Team warned. Some models of the Modicon Quantum PLC used in industrial control systems contain multiple hidden accounts that use predetermined passwords to grant remote access, the agency said in an advisory issued December 14. Palatine, Illinois– based Schneider Electric, the maker of the device, produced fixes for some of the weaknesses, and continues to develop additional mitigations. The programmable logic controllers reside at the lowest levels of an industrial plant, where computerized sensors meet the valves, turbines, or other machinery being controlled. The default passwords are hard-coded into Ethernet cards the systems use to funnel commands into the devices, and get temperatures and other data out of them. The Ethernet modules also allow administrators to remotely log into the machinery using protocols such as telnet, FTP, and the Windriver Debug port. According to a blog post published December 12 by an independent security researcher, the NOE 100 and NOE 771 modules contain at least 14 hard-coded passwords, some of which are published in support manuals. Even in cases where the passcodes are obscured using cryptographic hashes, they are easy to recover thanks to documented weaknesses in the underlying VxWorks operatingsystem. As a result, attackers can exploit the weakness to log into devices and gain privileged access to their controls.


Read more : 


The source article is worth visiting for at least two reasons.  It gives us the link for "the  blog post published on Monday by independent security researcher Rubén Santamarta," and goes on to inform us, just after the end of the passage the DHS saw fit to quote:


SCADA vuln imperils critical infrastructure, feds warn. 

December 14, The Register – (International) 

Hard-coded passwords are a common weakness built into many industrial control systems, including some S7 series of PLCs from Siemens. Because the systems control the machinery connected to dams, gasoline refineries, and water treatment plants, unauthorized access is considered a national security threat because it could be used to sabotage their operation.


Read more 



Remind anyone of anything ?

From Schneider Electric (which forms, according to Wikipedia , a cornerstone of AREVA:



Total safety: The cornerstone of our business 

Although electricity is the most flexible energy to generate, transmit and use, 
it can be hazardous if not properly managed. From homes to nuclear power 
plants, Schneider Electric’s mission is to ensure the safety of people and 
equipment. 

Read more 


In fact, Modicon PLC's were, at least as of 2006, in use at
  • at least one nuclear plant in Virginia 
  • two in Korea ("The DPS [Diverse Protection System] configuration is based on a Modicon PLC, which is now supplied by Schneider Electric." notes the NRC, adding helpfully "The use of multiple vendors and digital platforms promotes system diversity among the echelons of defense."
  • in Bruce Nuclear Generation Station at Tiverton, Ontario 
  • and no doubt many more I have not the determination, at present, out of obscurity to dig,  given the penchant this industry has into the same, to bury.  Witness how neatly the following company avoids, in their boasts, the very proper nouns that would pinpoint what nuclear power plants, likely Canadian, are now at risk:



Synopsis of Nuclear Reactor Retubing Controls Automation System Project

Situation: A nuclear power generation company committed to upgrading its operations with new reactors.
Issues: Aging reactors subject to problems such as water leakage, corrosion, and contamination (fine powdery particulate—iron oxide activated to isotope FE55—as a result of corrosion) that are potentially hazardous and costly to deal with.
Requirement: Upgrade of 2 reactors (including re-tubing operations).
Technology: Unity Pro IEC 61131-3 application software/Modicon Quantum PLC platform; GE Iconics Series HMI; Ethernet; Kepware OPC driver; Kollmorgen drives; PICS™ simulation.


Read more  


Be seeing you.