"JUST DISCOVERED WHAT IS DERAILING TRAINS, CLOSING AIRPORTS && DESTROYING CRITICAL lNFRASTRUCTURE"
SCADA systems (Supervisory Control And Data Acquisition) are responsible for air traffic controlling, remote train monitoring and control systems and provide almost all critical infrastructure with visibility/control of failure conditions in complex systems.
STUXNET is a malware software designed by 1srae1 and approved by the U.S. to attack SCADA systems.
https://www.hstoday.us/federal-pages/dhs/stuxnet-and-beyond-the-origins-of-scada-and-vulnerabilities-to-critical-infrastructure/
"SCADA systems are used to operate large-scale systems around the world, to include the U.S. The widespread adoption of SCADA grew because of the need to more economically manage large-scale industrial systems to support modern society’s growing demand for products, services, and utilities. The sheer size, complexity, and sensitivity of these large-scale industrial systems requires continuous monitoring, communication, and coordination at remote locations to provide needed utility services.
Prior to SCADA, industrial systems required numerous personnel to continuously monitor and coordinate activities, often by pre-digital analog devices. Personnel would monitor industrials systems and relay information to the main operator. As industrial complexity grew, sites became larger and as demand grew, sites often became more remote. In response, human-enabled analog systems become more cumbersome, time consuming, and uneconomical, and just in time digital technology grew and is pervasive today across industry.
One of the most foundational early tests to illustrate the risk of cyber-attacks on SCADA was conducted in 2007, when the Department of Energy (DOE) and Department of Homeland Security (DHS) carried out the AURORA Project test in cooperation with the Idaho National Engineering Lab (INEL). AURORA’s purpose was to demonstrate how the growing reliance on SCADA systems was increasing U.S. critical infrastructure’s vulnerability to cyber-attacks, in this case a rotating diesel generator running on three-phase power. INEL engineers executed various cyber-attacks remotely through the internet and repeatedly turned it on and off putting it out of phase and within minutes caused the generator to implode from the generated stresses.
In 2010, a highly publicized cyber-attack on a SCADA system was uncovered. Malware was discovered on several systems across the globe, with an unusually high concentration of impacted systems in Iran. The malware was quickly named Stuxnet and was identified as a highly sophisticated and complex computer worm. Stuxnet garnered much attention from the international community as it became apparent that an unknown actor designed it to attack a particular SCADA brand and model; as such, Stuxnet still represents a key moment in the history of cyber-attacks on industrial systems. Stuxnet is worth discussing further.
Stuxnet was specifically engineered to attack a specific device and model within a particular industrial system. The apparent target was the PLCs associated with Iran’s Nantanz nuclear power facility’s centrifuges. Stuxnet compromised the integrity of the centrifuges by increasing their speed beyond their specification limits and making that unbeknownst to the operators, until the centrifuges were damaged. The attack allegedly destroyed upwards of 20 percent of Iran’s nuclear centrifuges and set back Iran’s nuclear program, which was believed to be the intent of the attack.
p1