Russian antivirus organisation Kaspersky Lab is on a hunt for developers to finish a secure handling complement that could deflect off a subsequent Stuxnet conflict on industrial control systems.
The company, that progressing this year reported a find of ‘super-weapon’ malware Flame, is seeking a developer and researcher to assistance emanate an handling complement that prevents untrusted equipment from executing on routine control systems (PCS), according to Russian recruitment site, HeadHunter.
The postings contend a Kaspersky Lab plan “is building rapidly”. It wants recruits with believe programming PCS and Supervisory Control And Data Acquisition (SCADA) systems, implementing industrial networking and communications protocols, and believe of Siemens, Emerson, Omron, ABB and other programmable proof controllers.
Some of a core program flaws Stuxnet exploited to conflict Iran’s Natanz arch improvement trickery were a Siemens Simatic STEP 7 and Simatic PCS 7 that a German association patched (PDF) final month.
Recruits would also need believe of Windows, Linux and QNX, that is used in industrial control systems and some-more recently has been put to work in RIM’s PlayBook.
Russian news site CNews final week reported a dual roles on offer during Kaspersky Lab, observant a plan was expected a response to Stuxnet that could fill a opening in a margin of Windows-based routine virtualisation security.
The association has not commented on a pursuit postings, though Kaspersky Lab chief, Eugene Kaspersky, forsaken a large spirit during a AusCERT discussion in May, revelation a assembly SCADA was “not probable to protect” and that these systems could be “very easy victims”.
“The usually approach to strengthen vicious infrastructure – is to redesign SCADA systems formed on a secure handling system. It is probable to do, though it requires a redesign of all a program for industrial systems,” CSO.com.au reported during a time.
Cyber confidence researcher and CEO of Taia Global, Jeffrey Carr, said a Kaspersky-made secure handling complement for industrial control systems “makes a lot of sense” and would substantially be in high demand, though he also points to Kaspersky’s “close attribute to Russia’s confidence services”.
“Under Russian law, a FSB could ask Kaspersky to embody a backdoor in a secure O/S and a association would be compulsory to comply. In fact, we can’t suppose a FSB blank out on such an event for comprehension collection opposite intensity business among a Commonwealth of Independent States, India, China, South Africa and others.”
Taia’s research (PDF) of Russian law and a implications for Kaspersky Lab products was linked-to in a new [[XREF: http://www.wired.com/dangerroom/2012/07/ff_kaspersky/all/
|Wired profile|]] of Mr Kaspersky that highlighted his connectors to a Kremlin and a confidence arm, a FSB.
Kaspersky responded to a square with a extensive list of corrections, including that a association supposing ‘expertise and zero more’.