Food Engineering logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Food Engineering logo
  • NEWS
    • Latest Headlines
    • Manufacturing News
    • People & Industry News
    • Plant Openings
    • Recalls
    • Regulatory Watch
    • Supplier News
  • PRODUCTS
    • New Plant Products
    • New Retail Products
  • TOPICS
    • Alternative Protein
    • Automation
    • Cannabis
    • Cleaning | Sanitation
    • Fabulous Food Plants
    • Food Safety
    • Maintenance Strategies
    • OEE
    • Packaging
    • Sustainability
    • More
  • EXCLUSIVES
    • Plant Construction Survey
    • Plant of the Year
    • Sustainable Plant of the Year
    • State of Food Manufacturing
    • Top 100 Food & Beverage Companies
  • MEDIA
    • Podcasts
    • Videos
    • Webinars
    • White Papers
  • FOOD MASTER
  • EVENTS
    • Food Automation & Manufacturing Symposium and Expo
    • Industry Events
  • RESOURCES
    • Newsletter
    • Custom Content & Marketing Services
    • FE Store
    • Government Links
    • Industry Associations
    • Market Research
    • Classified Ads
  • EMAGAZINE
    • eMagazine
    • Archive Issue
    • Advertise
  • SIGN UP!
Automation

Update: Malware affects Siemens WinCC and PCS7 equipment

July 19, 2010
The unwanted software’s main purpose may be industrial espionage.


UPDATE: Siemens Support Link for Stuxnet

28 SEP 2010: Keep up to date by visiting the Siemens Support Website:

Some malware, a so-called Trojan, is currently circulating which affects Microsoft Windows PCs with WinCC and PCS 7. The malware spreads via mobile data carriers, for example USB sticks, and networks. The Trojan is activated solely by viewing the contents of the USB stick.

Find the latest information and help on Stuxnet from the Siemens Support Website.


UPDATE: Microsoft releases patch

UPDATE-Microsoft has released a patch for the Stuxnet vulnerability, and Byres Security has updated its recommendations for addressing this critical SCADA-focused software worm. A revised white paper “Siemens PCS7 WinCC Malware” is available for download by all Tofinosecurity.com members now.

Readers can become a member by signing up. There is no charge, and Byres has created a very complete program to ensure member privacy.

Byres Security has also begun a blog called Practical SCADA Security. The intent is to provide clear and simple guidance when situations like Stuxnet occur.


The unwanted software's main purpose may be industrial espionage

Eric Byres, industrial network security specialist and chief technology officer of Byres Security Inc., reports investigating a new family of threats called Stuxnet, which appears to be directed specifically at Siemens WinCC and PCS7 products via a previously unknown Windows vulnerability. 

At the same time Byres also reports a concerted Denial of Service (DOS) attack against a number of the SCADA information networks such as SCADASEC and ScadaPerspective mailing lists. At least one of these services, he says, was brought down and taken off line.

Byres has been able to determine the following:

  • This is a zero-day exploit against all versions of Windows including Windows XP SP3, Windows Server 2003 SP 2, Windows Vista SP1 and SP2, Windows Server 2008  and Windows 7.
  • There are no patches available from Microsoft at this time, although there are some work-arounds (see below).
  • This malware is in the wild and probably has been for the past month.
  • The known variations of the malware are specifically directed at Siemens WinCC and PCS7 Products.
  • The malware is propagated via USB keys. It may also be propagated via network shares from other infected computers.
  • Disabling AutoRun does not help! Simply viewing an infected USB key using Windows Explorer will infect your computer.
  • The objective of the malware appears to be industrial espionage; i.e. to steal intellectual property from SCADA and process control systems. Specifically, the malware uses the Siemens default password of the MSSQL account WinCCConnect to log into the PCS7/WinCC database and extract process data and possibly HMI screens.

The only known work-arounds are:

  • Do not install any USB keys into any Windows systems, regardless of the OS patch level or whether AutoRun has been disabled or not.
  • Disable the displaying of icons for shortcuts (this involves editing the registry).
  • Disable the WebClient service.
Byres extracted and summarized the relevant data, and has assembled it in a short white paper called “Analysis of Siemens WinCC/PCS7 Malware Attacks.” Registered site users can freely download the white paper, and new visitors may register. Byres screens every new registration, so there may be a delay in processing. Byres may be contacted at 250-390-1333.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
to unlock your recommendations.

Already have an account? Sign In

  • 2025 Top 100 Food and Beverage Companies

    FOOD ENGINEERING’s 2025 Top 100 Food and Beverage Companies

    While sales were largely down under dynamic economic and...
    Top 100 Food & Beverage Companies
    By: Alyse Thompson-Richards
  • Bottling machine

    How Optical and X-Ray Inspection Supports Bottling Safety and Quality

    By transitioning from legacy single-technology systems to...
    Food Safety
    By: Dan McKee
  • Bread baking in oven

    The State of Food Manufacturing in 2025

    Food and beverage manufacturers are investing in...
    Manufacturing News
    By: Alyse Thompson-Richards
Manage My Account
  • eMagazine
  • Newsletter
  • Online Registration
  • Manage My Preferences
  • Customer Service

More Videos

Popular Stories

alternative protein products

Alternative Protein in 2025: Key Trends and Technologies

The Campbell's Company logo

Campbell’s Terminates Exec Over Alleged Disparaging Comments

circular packaging material for frozen and chilled food packaging

Sustainable Barrier Coatings Replace PFAS, PE and other Plasticized Materials in Packaging

State of Maufacturing 2025

Events

June 17, 2025

Refrigerated & Frozen Foods’ State of the Cold Chain

On Demand Kelley Rodriguez, Editor in Chief of Refrigerated & Frozen Foods, will be joined in this 60-minute webinar by industry experts to help unpack the latest research.

July 23, 2025

Decarbonizing Process Heat: What You Should Know and Next Steps

On Demand Driven by climate goals, business risk, client interest, and resilience considerations, food and beverage companies are increasingly turning their attention to decarbonizing their production processes.

View All Submit An Event

Products

Recent Advances in Ready-to-Eat Food Technology

Recent Advances in Ready-to-Eat Food Technology

See More Products

CHECK OUT OUR NEW ESSENTIAL TOPICS

Alternative ProteinAutomationCleaning/SanitationFabulous Food Plants

Food SafetyMaintenance StrategiesOEE

PackagingSustainability

Related Articles

  • Tech Update: Filling Equipment

    See More
  • Tech Update: Filling Equipment

    See More
  • Tech Update: Cooling & Freezing Equipment

    See More
×

Elevate your expertise in food engineering with unparalleled insights and connections.

Get the latest industry updates tailored your way.

JOIN TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Food Master
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing