Page 1 of 2 12 LastLast
Results 1 to 10 of 13
Like Tree13Likes

Thread: Weaponized AC/DC!?

  1. #1
    Senior Member blabbermouth 1OldGI's Avatar
    Join Date
    Aug 2009
    Location
    New Port Richey, FL
    Posts
    3,819
    Thanked: 1185
    Blog Entries
    3

    Default Weaponized AC/DC!?

    The latest attack on the Iranian Nuclear Weapons Program Hacked Computers Play Thunderstruck in Iran Nuclear Facility | Geekosystem Just imagine being a scientest sitting at a computer at o'dark early in the morning when suddenly without warning AC/DC tunes begin blasting uncontrollably. No way at least some of these guys weren't diggin' this. These guys ROCK! I myself would have opted for some Yoko Ono (for maximum effect) but that's just me. Well played, hackers, well played indeed!
    AC/DC - Thunderstruck - YouTube


    Or perhaps a bit of old school with Bon Scott
    AC/DC- Highway To Hell Music Video - YouTube


    And this is just plain hilarious, a Palm Harbor boy (by way of Long Guyland, NY), Jim Bruer doing the AC/DC version of Hokey Pokey.
    Jim Breuer - Hokey Pokey.wmv - YouTube
nun2sharp likes this.

  • #2
    Senior Member blabbermouth Hirlau's Avatar
    Join Date
    Dec 2010
    Location
    South Florida
    Posts
    13,530
    Thanked: 3530

    Default

    They should have hit them with some RAP videos;
    then on second thought ,
    It would be more humane to use Stealth Bombers.

  • #3
    Thread derailment specialist. Wullie's Avatar
    Join Date
    Dec 2011
    Location
    Republica de Tejas
    Posts
    2,792
    Thanked: 884

    Default

    I think a dose of Mr Methane thrown in the mix would be good for a few laughs.
    ScottGoodman likes this.

  • #4
    what Dad calls me nun2sharp's Avatar
    Join Date
    Feb 2008
    Location
    Kansas city area USA
    Posts
    9,172
    Thanked: 1677

    Default

    Playing Yoko Ono would have started a war for sure. The inhumanity of it!
    It is easier to fool people than to convince them they have been fooled. Twain

  • #5
    Obsessive compulsive EisenFaust's Avatar
    Join Date
    Feb 2010
    Location
    New Zealand
    Posts
    1,315
    Thanked: 323

    Default

    Yoko would have made the whole scientific team disband and go solo - too dangerous!

  • #6
    Senior Member blabbermouth ScoutHikerDad's Avatar
    Join Date
    May 2010
    Location
    Upstate South Carolina
    Posts
    3,308
    Thanked: 987

    Default

    Yoko's caterwauling probably would have done serious damage to the reactors or something. Anybody wanna speculate on who is behind this? Almost certainly Israel, and I figure at least a knowing wink and a lot of look the other way from the US. That and some of the assassinations of key personnel are very interesting. I can't imagine all-out war with Iran (who could probably expect at least some help from Russia, China, Syria et al). Interesting times, gentlemen...

  • #7
    aka shooter74743 ScottGoodman's Avatar
    Join Date
    Sep 2009
    Location
    SE Oklahoma/NE Texas
    Posts
    7,285
    Thanked: 1936
    Blog Entries
    4

    Default

    As funny as it is, it's a really scary thing if those same systems were tied into the control systems. The concept of "hacking" fascinates me...
    Southeastern Oklahoma/Northeastern Texas helper. Please don't hesitate to contact me.
    Thank you and God Bless, Scott

  • #8
    I shave with a spoon on a stick. Slartibartfast's Avatar
    Join Date
    Jan 2009
    Location
    Stay away stalker!
    Posts
    4,578
    Thanked: 1262
    Blog Entries
    1

    Default

    You should read about stuxnet.

    How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History | Threat Level | Wired.com

    Quote Originally Posted by shooter74743 View Post
    As funny as it is, it's a really scary thing if those same systems were tied into the control systems. The concept of "hacking" fascinates me...

  • The Following 2 Users Say Thank You to Slartibartfast For This Useful Post:

    nun2sharp (07-31-2012), ScottGoodman (07-31-2012)

  • #9
    aka shooter74743 ScottGoodman's Avatar
    Join Date
    Sep 2009
    Location
    SE Oklahoma/NE Texas
    Posts
    7,285
    Thanked: 1936
    Blog Entries
    4

    Default

    Interesting story indeed, especially the part where the hacker is still at large and had plenty of time to write a LOT of code...
    Southeastern Oklahoma/Northeastern Texas helper. Please don't hesitate to contact me.
    Thank you and God Bless, Scott

  • #10
    Heat it and beat it Bruno's Avatar
    Join Date
    Nov 2006
    Location
    Belgium
    Posts
    15,132
    Thanked: 5229
    Blog Entries
    10

    Default

    You are starting from a false premise. Code such as stuxnet is not the work of a 'hacker'.
    It is the work of a team back by some serious players. stuxnet is complex, and would have required

    1) some serious windows hacking know-how to come up with 4 zero-day exploits*. This is heavy stuff.
    2) expert knowledge and exact details of the siemens systems which ran the centrifuges. this includes the ability to reprogram the controllers at runtime without anyone noticing, and then fooling the monitoring systems by faking telemetry data while subtly disrupting the control process. Again, this requires experts.
    3) physically breaking into 2 electronics / software firms in taiwan and stealing their private signing keys.

    I recently attended a talk by Mark Russinovich, and he said it is almost certain that it was a US-Israeli intelligence effort. He was scared most by the fact that they had gone so far as to steal private software keys for signing the virus code, because that was a step in the malware arms race which had so far not been taken by anyone.

    By the same token, the ACDC music thing is the work of a complete amateur / prankster, not meant to do any real work.
    Malware such as stuxnet is designed to stay unnoticed for as long as possible. Stuxnet was only discovered by sheer dumb luck after having been at work for years. Being unnoticed is a prime objective.

    Playing ACDC loudly from the speakers kind of goes against the whole point of having malware for intelligence purposes

    (*) a zero-day exploit is a bug in a piece of software which is unknown by the industry and for which there is no antivirus signature. So whn it is discovered, the industry has zero days to deal with it. When bugs are reported by security researchers in private, they agree on a numbe rof days after which the exploit is made public. during that time, the security industry and the software vendor have the time to update virus scanners and create bugfixes.
    Last edited by Bruno; 07-31-2012 at 09:06 PM.
    Til shade is gone, til water is gone, Into the shadow with teeth bared, screaming defiance with the last breath.
    To spit in Sightblinder’s eye on the Last Day

  • Page 1 of 2 12 LastLast

    Posting Permissions

    • You may not post new threads
    • You may not post replies
    • You may not post attachments
    • You may not edit your posts
    •