Do you have adblock enabled?
 
If you can read this, either the style sheet didn't load or you have an older browser that doesn't support style sheets. Try clearing your browser cache and refreshing the page.

(Gizmodo)   Some Oil Platforms have been rendered incapacitated by malware downloaded via pirated porn and movies. Sleep well tonight   (gizmodo.com ) divider line
    More: Scary, TNW, drilling rigs, malware, anti-virus software, oil spills  
•       •       •

3985 clicks; posted to Geek » on 24 Feb 2013 at 1:09 AM (3 years ago)   |   Favorite    |   share:  Share on Twitter share via Email Share on Facebook   more»



42 Comments   (+0 »)
   
View Voting Results: Smartest and Funniest

Archived thread
 
2013-02-23 11:07:02 PM  
Sleep well tonight
 
2013-02-24 12:33:40 AM  
Drill baby drill!
 
2013-02-24 12:45:56 AM  
but but but
but HOW were their drilling systems affected?
They wouldnt be connected to a network would they? That would be such an obvious security risk.

/lol
 
2013-02-24 01:12:46 AM  
I'm betting it gets awfully boring and lonely on those platforms.
 
2013-02-24 01:17:22 AM  

namatad: but but but
but HOW were their drilling systems affected?
They wouldnt be connected to a network would they? That would be such an obvious security risk.

/lol


Shut up, this has nothing to do with oversight by those managing the rigs.

This is America, we don't think our problems through, we lash out in a panic at whatever is dangled in front of our faces.

The obvious answer here is to pass SOPA/PIPA v4.0 and save the world from the menacing pirates.
 
2013-02-24 01:18:21 AM  
Why on Earth would those people think of porn, watching shafts go up and down and up and down, well lubricated and all.

cogdogblog.com
 
2013-02-24 01:24:32 AM  
Is  nothing sacred, China? Oil, porn and stealing intellectual property are three things that make America great.

/no proof, just a guess about the perps
 
2013-02-24 01:36:08 AM  
Tell me, how hard is it to separate the crew quarter's internet from the operations one...
 
2013-02-24 01:49:46 AM  
BP slaps forehead wondering why they didnt use that one.
 
2013-02-24 01:52:05 AM  
Never forget that your information infrastructure is only as secure as the person who either finds a free USB key drive on the ground somewhere, or decides he wants to spank it off at work.
 
2013-02-24 02:34:18 AM  

MurphyMurphy: namatad: but but but
but HOW were their drilling systems affected?
They wouldnt be connected to a network would they? That would be such an obvious security risk.

/lol

Shut up, this has nothing to do with oversight by those managing the rigs.

This is America, we don't think our problems through, we lash out in a panic at whatever is dangled in front of our faces.

The obvious answer here is to pass SOPA/PIPA v4.0 and save the world from the menacing pirates.


You would think that normal.  But this is nuanced malware (says so in TFA), so it is a bit more sophisticated in how it attacks.

".. the malware that's screwing stuff up is just nuance-grade .."
 
2013-02-24 02:34:57 AM  
I worked for this major company that had bought a shiat load of smaller companies and were migrating them over to their network. The problem was that many of these smaller companies that were bought had almost 0 security and the team that was doing the migration didn't take that into consideration. As it turned out many of the end users had Kazza and had downloaded viruses. Just about all of the viruses were caught and dealt with except for one that was completely undetected by the anti virus software and ended up infecting 90% of the company's workstations in North America. It was almost a week before a solution for the virus a found, and then after that each computer had to be cleaned by hand. For just about two weeks there was almost no work getting done.
 
2013-02-24 03:07:54 AM  

Mentat: Drill baby drill!


i47.tinypic.com
 
2013-02-24 03:24:13 AM  
Drilling engineer, been off shore, getting a kick etc.

/drill baby drill
//daddy needs another car
 
2013-02-24 03:56:32 AM  
Rendered incapacitated? Am I missing a joke or is English subbys second language?
 
2013-02-24 06:04:49 AM  
As an industrial ITish type person who works on control networks, I can tell you that a majority of these control system networks are separate from the interweb-surfing business network. The main problem for us was USB keys. Vendors or reps would need to sneaker net solutions (as would we) into the control system and unbeknownst to them their flash drive would contain a virus. We scan all flash drives before they're put on our networks but people sometimes don't realize the ease of infection and don't follow proper procedure for virus checking before they just go plugging their dongles into any port of their choosing.

/giggity?
//they're getting more secure and allowing business and control systems to intermingle but for this virus reason a lot of us are still very hesitant to allow this. Yeah yeah firewalls and stuff...
 
2013-02-24 08:03:21 AM  

namatad: but but but
but HOW were their drilling systems affected?
They wouldnt be connected to a network would they? That would be such an obvious security risk.

/lol


Rule #35: A USB or CD drive WILL eventually have porn loaded into it.

The only way around this would be to remove the CD drives and fill the USB slots with epoxy.
/Yes, I've had to do that with laptops before.  Also had to remove the webcam and wifi antenna.
//Some idiot bought a dozen $4000 alienwares to use inside a guarded shack that you needed a secret clearance, an armed escort, and a patdown for cellphones and cameras to enter.
///No, he did not like my idea of just selling the things to Marines on base and using that money to buy two dozen dells, a few cases of beer, and a cow's worth of steaks.
 
2013-02-24 08:29:55 AM  

Karac: //Some idiot bought a dozen $4000 alienwares to use inside a guarded shack that you needed a secret clearance, an armed escort, and a patdown for cellphones and cameras to enter.
///No, he did not like my idea of just selling the things to Marines on base and using that money to buy two dozen dells, a few cases of beer, and a cow's worth of steaks.


Geez... I hate spending $500 for a new system. "Idiots" is too mild a word.

/hope you pulled the Wi-Fi card as well (assuming it isn't a chipset soldered to the motherboard)
 
2013-02-24 09:06:49 AM  
Run all your control system hardware on a segregated network on Linux, locked down to the point that nothing works except for what is absolutely critical.

Tell everybody who works there to bring their own laptop for personal use, and set up a secondary network to allow this to happen.
 
2013-02-24 09:08:56 AM  

Karac: namatad: but but but
but HOW were their drilling systems affected?
They wouldnt be connected to a network would they? That would be such an obvious security risk.

/lol

Rule #35: A USB or CD drive WILL eventually have porn loaded into it.

The only way around this would be to remove the CD drives and fill the USB slots with epoxy.
/Yes, I've had to do that with laptops before.  Also had to remove the webcam and wifi antenna.
//Some idiot bought a dozen $4000 alienwares to use inside a guarded shack that you needed a secret clearance, an armed escort, and a patdown for cellphones and cameras to enter.
///No, he did not like my idea of just selling the things to Marines on base and using that money to buy two dozen dells, a few cases of beer, and a cow's worth of steaks.


Where I work at CD drives and USB drives are disabled by GPO, and only administers are able to use them unless a request is put in to allow a person to use it. The WiFi cards use to be disabled in BIOS until people started complaining because they wanted to use their computers on their wireless networks when at home.
 
2013-02-24 09:53:50 AM  
FTA: " ..the malware that's screwing stuff up is just nuance-grade.."
 
2013-02-24 10:19:48 AM  
I repeat my argument for more Mormons on oil platforms.
 
2013-02-24 10:55:26 AM  
Was the malware imbedded in the media files themselves?  The article wasn't clear about this.
 
2013-02-24 02:03:08 PM  
Misread that as "narwals."
 
2013-02-24 03:17:18 PM  

BolshyGreatYarblocks: I repeat my argument for more Mormons on oil platforms.


Doesn't UTAH the highest per capita online porn usage?
 
2013-02-24 06:01:41 PM  
On my blu-ray copy of Firefly, evey single episode has a long list of warnings about where you can't watch them.

One of those places you can't watch firefly on blu ray is on oil rigs.

They tell you in English, Spanish, French, German, Japanese, and Korean.

It's no wonder they're using pirated shiat on those rigs.
 
2013-02-24 06:02:56 PM  

PsyLord: Was the malware imbedded in the media files themselves?  The article wasn't clear about this.


The article doesn't know. They mention that rigs don't have internet as such due to their location, but that malware can get in through things like infected USB drives full of pirate media.
 
2013-02-24 06:38:24 PM  

ongbok: Where I work at CD drives and USB drives are disabled by GPO, and only administers are able to use them unless a request is put in to allow a person to use it. The WiFi cards use to be disabled in BIOS until people started complaining because they wanted to use their computers on their wireless networks when at home.


Wait, they go to all this trouble to avoid attack vectors being brought into the office...and then let the idiots bring the same laptops home and hook them onto their home network?  Wat.

*facepalm*
 
2013-02-24 07:16:02 PM  
"The tide is slowly rising and incrementally making things better, but the exposed area is really so high that it's not really fast enough to limit the risk," said Misha Govshteyn, co-founder of Alert Logic, a network security company.
Malware infections have occurred at several offshore rigs and platforms, knocking some offline, cybersecurity professionals said.

I'm going to call bullshiat on this whole article.

1. The source is a company selling network security. Porn is one of those scaremonger topics for companies.
2. No mention is made of incidents or companies. Unless they're going to name companies or locations, there is no way to verify their claims.
3. Viruses are almost impossible deploy via porn or music, without exploiting some sort of buffer overflow in the media player, because they're data rather than programs. I'm not sure if you can get things to boot from a USB drive, but you can't then connect that to porn or pirated music being the cause. Pirated software and games are far more likely to give you a virus.
4. I'm pretty sure that most rigs, if they have PCs have a $30 virus checker.
5. I seriously, seriously doubt that the average rig mechanic gets anywhere near the safety systems, nor that they are connected to the PCs people use for jacking off, nor that they are running a desktop or server version of Windows. Safety systems are often built using embedded technology. You want something that's real simple that isn't going to fail.
 
2013-02-24 07:39:27 PM  
I've met some of guys who do the network infrastructure here in the states for rigs, I'm calling shenanigans, especially since company policies regarding porn on a company computer at at least the houston based places would involve you being fired quickly.
 
2013-02-24 07:40:40 PM  

wingnut396: You would think that normal.  But this is nuanced malware (says so in TFA), so it is a bit more sophisticated in how it attacks.".. the malware that's screwing stuff up is just nuance-grade .."


so it only works only when certain phrases are uttered?
 
2013-02-24 08:26:25 PM  
Pirates wreaking havoc off our shores? They're just in search of booty.
 
2013-02-24 08:31:00 PM  
Well, I hope Al Qaeda doesn't read Gizmodo...
 
2013-02-24 10:54:56 PM  

BumpInTheNight: ongbok: Where I work at CD drives and USB drives are disabled by GPO, and only administers are able to use them unless a request is put in to allow a person to use it. The WiFi cards use to be disabled in BIOS until people started complaining because they wanted to use their computers on their wireless networks when at home.

Wait, they go to all this trouble to avoid attack vectors being brought into the office...and then let the idiots bring the same laptops home and hook them onto their home network?  Wat.

*facepalm*


Some people do often work from home also, and unless they are going to give them a second laptop for home use, they do have to take them home with them.

farkeruk: "The tide is slowly rising and incrementally making things better, but the exposed area is really so high that it's not really fast enough to limit the risk," said Misha Govshteyn, co-founder of Alert Logic, a network security company.
Malware infections have occurred at several offshore rigs and platforms, knocking some offline, cybersecurity professionals said.

I'm going to call bullshiat on this whole article.

1. The source is a company selling network security. Porn is one of those scaremonger topics for companies.
2. No mention is made of incidents or companies. Unless they're going to name companies or locations, there is no way to verify their claims.
3. Viruses are almost impossible deploy via porn or music, without exploiting some sort of buffer overflow in the media player, because they're data rather than programs. I'm not sure if you can get things to boot from a USB drive, but you can't then connect that to porn or pirated music being the cause. Pirated software and games are far more likely to give you a virus.
4. I'm pretty sure that most rigs, if they have PCs have a $30 virus checker.
5. I seriously, seriously doubt that the average rig mechanic gets anywhere near the safety systems, nor that they are connected to the PCs people use for jacking off, nor that they are running a desktop or server version of Windows. Safety systems are often built using embedded technology. You want something that's real simple that isn't going to fail.


It doesn't necessarily have to be porn. It could one of those puzzle games or a flash game that they installed on the computer to entertain themselves that also contained malware that was drive by downloaded.
 
2013-02-25 11:02:43 AM  
True Fact:  I would be watching video of naked people farking right now, at work, if I wasn't scared of viruses.
 
2013-02-25 01:48:55 PM  

farkeruk: "The tide is slowly rising and incrementally making things better, but the exposed area is really so high that it's not really fast enough to limit the risk," said Misha Govshteyn, co-founder of Alert Logic, a network security company.
Malware infections have occurred at several offshore rigs and platforms, knocking some offline, cybersecurity professionals said.

I'm going to call bullshiat on this whole article.

1. The source is a company selling network security. Porn is one of those scaremonger topics for companies.
2. No mention is made of incidents or companies. Unless they're going to name companies or locations, there is no way to verify their claims.
3. Viruses are almost impossible deploy via porn or music, without exploiting some sort of buffer overflow in the media player, because they're data rather than programs. I'm not sure if you can get things to boot from a USB drive, but you can't then connect that to porn or pirated music being the cause. Pirated software and games are far more likely to give you a virus.
4. I'm pretty sure that most rigs, if they have PCs have a $30 virus checker.
5. I seriously, seriously doubt that the average rig mechanic gets anywhere near the safety systems, nor that they are connected to the PCs people use for jacking off, nor that they are running a desktop or server version of Windows. Safety systems are often built using embedded technology. You want something that's real simple that isn't going to fail.


While I agree with most of these... AnnaKournikova.jpg.vbs
 
2013-02-25 02:10:12 PM  

farkeruk: Safety systems are often built using embedded technology. You want something that's real simple that isn't going to fail.


SCADA has no known flaws.  Ask the Iranian nuclear enrichment program.
 
2013-02-25 04:33:33 PM  

ongbok: Some people do often work from home also, and unless they are going to give them a second laptop for home use, they do have to take them home with them.


Its still amusingly "Lock & bar the windows but leave the front door wide open".  A second laptop wouldn't close the security hole either since they've likely gotta sync what they do at home with what they do at work.
 
2013-02-25 05:13:30 PM  

BumpInTheNight: ongbok: Some people do often work from home also, and unless they are going to give them a second laptop for home use, they do have to take them home with them.

Its still amusingly "Lock & bar the windows but leave the front door wide open".  A second laptop wouldn't close the security hole either since they've likely gotta sync what they do at home with what they do at work.


What are you going to do? Some people need to work from home. GPO are used to keep people from installing anything or saving anything on the machine. It is repetitively safe.
 
2013-02-25 05:25:12 PM  

ongbok: What are you going to do? Some people need to work from home. GPO are used to keep people from installing anything or saving anything on the machine. It is repetitively safe.


GPOs stop legitimate attempts but only legitimate attempts to do things, the obvious solution is if IT security is that much of a concern then don't let people take secure devices out of the office and if they need to work from home with a laptop that's able to talk to the rest of their home network & the internet at large maybe they need to find a different job.  Basically what I'm saying is why go to all the trouble of disabling optical drives and USB ports when someone's potentially infested home or hotel's or coffee shop's network is going to be bashing down the machine's front door the moment its connected to their network.

Or just chuckle about the lop-sided security measures like I did.
 
2013-02-25 07:10:54 PM  

BumpInTheNight: ongbok: What are you going to do? Some people need to work from home. GPO are used to keep people from installing anything or saving anything on the machine. It is repetitively safe.

GPOs stop legitimate attempts but only legitimate attempts to do things, the obvious solution is if IT security is that much of a concern then don't let people take secure devices out of the office and if they need to work from home with a laptop that's able to talk to the rest of their home network & the internet at large maybe they need to find a different job.  Basically what I'm saying is why go to all the trouble of disabling optical drives and USB ports when someone's potentially infested home or hotel's or coffee shop's network is going to be bashing down the machine's front door the moment its connected to their network.

Or just chuckle about the lop-sided security measures like I did.


Well we never had a problem, and most companies don't have problems either, so chuckle all you want.
 
2013-02-25 07:29:27 PM  

ongbok: Well we never had a problem, and most companies don't have problems either, so chuckle all you want.


Meh, word to the wise:  The most dangerous problems never let you know they happened until its too late if ever.  Just to ask though, these laptops, they dismantle the firewire ports on them at least eh?  Like physically damage them so they cannot be used?
 
Displayed 42 of 42 comments

View Voting Results: Smartest and Funniest


This thread is archived, and closed to new comments.

Continue Farking
Submit a Link »
On Twitter






In Other Media


  1. Links are submitted by members of the Fark community.

  2. When community members submit a link, they also write a custom headline for the story.

  3. Other Farkers comment on the links. This is the number of comments. Click here to read them.

  4. Click here to submit a link.

Report