Russian antivirus firm Kaspersky Lab is on the hunt for developers to complete a secure operating system that could fend off the next Stuxnet attack on industrial control systems.

The company, which earlier this year reported the discovery of ‘super-weapon’ malware Flame, is seeking a developer and analyst to help create an operating system that prevents untrusted items from executing on process control systems (PCS), according to Russian recruitment site, HeadHunter.

The postings say the Kaspersky Lab project “is developing rapidly”. It wants recruits with experience programming PCS and Supervisory Control And Data Acquisition (SCADA) systems, implementing industrial networking and communications protocols, and knowledge of Siemens, Emerson, Omron, ABB and other programmable logic controllers.

Some of the core software flaws Stuxnet exploited to attack Iran's Natanz nuclear enrichment facility were the Siemens Simatic STEP 7 and Simatic PCS 7 that the German company patched (PDF) last month.

Recruits would also need knowledge of Windows, Linux and QNX, which is used in industrial control systems and more recently has been put to work in RIM’s PlayBook.

Russian news site CNews last week reported the two roles on offer at Kaspersky Lab, noting the project was likely a response to Stuxnet that could fill a gap in the field of Windows-based process virtualisation security.

The company has not commented on the job postings, but Kaspersky Lab chief, Eugene Kaspersky, dropped a big hint at the AusCERT conference in May, telling the audience SCADA was “not possible to protect” and that these systems could be “very easy victims”.

“The only way to protect critical infrastructure – is to redesign SCADA systems based on a secure operating system. It is possible to do, but it requires a redesign of all the software for industrial systems,” CSO.com.au reported at the time.

Cyber security researcher and CEO of Taia Global, Jeffrey Carr, said a Kaspersky-made secure operating system for industrial control systems “makes a lot of sense” and would probably be in high demand, but he also points to Kaspersky’s “close relationship to Russia’s security services”.

“Under Russian law, the FSB could ask Kaspersky to include a backdoor in its secure O/S and the company would be required to comply. In fact, I can't imagine the FSB missing out on such an opportunity for intelligence collection against potential customers among the Commonwealth of Independent States, India, China, South Africa and others.”

Taia’s analysis (PDF) of Russian law and the implications for Kaspersky Lab products was linked-to in a recent [[XREF: http://www.wired.com/dangerroom/2012/07/ff_kaspersky/all/ |Wired profile|]] of Mr Kaspersky that highlighted his connections to the Kremlin and its security arm, the FSB.

Kaspersky responded to the piece with a lengthy list of corrections, including that the company provided ‘expertise and nothing more’.

Follow @CSO_Australia and sign up to the CSO Australia newsletter.

Kaspersky building new secure SCADA handling system

Russian antivirus organisation Kaspersky Lab is on a hunt for developers to finish a secure handling complement that could deflect off a subsequent Stuxnet conflict on industrial control systems.

The company, that progressing this year reported a find of ‘super-weapon’ malware Flame, is seeking a developer and researcher to assistance emanate an handling complement that prevents untrusted equipment from executing on routine control systems (PCS), according to Russian recruitment site, HeadHunter.

The postings contend a Kaspersky Lab plan “is building rapidly”. It wants recruits with believe programming PCS and Supervisory Control And Data Acquisition (SCADA) systems, implementing industrial networking and communications protocols, and believe of Siemens, Emerson, Omron, ABB and other programmable proof controllers.

Some of a core program flaws Stuxnet exploited to conflict Iran’s Natanz arch improvement trickery were a Siemens Simatic STEP 7 and Simatic PCS 7 that a German association patched (PDF) final month.

Recruits would also need believe of Windows, Linux and QNX, that is used in industrial control systems and some-more recently has been put to work in RIM’s PlayBook.

Russian news site CNews final week reported a dual roles on offer during Kaspersky Lab, observant a plan was expected a response to Stuxnet that could fill a opening in a margin of Windows-based routine virtualisation security.

The association has not commented on a pursuit postings, though Kaspersky Lab chief, Eugene Kaspersky, forsaken a large spirit during a AusCERT discussion in May, revelation a assembly SCADA was “not probable to protect” and that these systems could be “very easy victims”.

“The usually approach to strengthen vicious infrastructure – is to redesign SCADA systems formed on a secure handling system. It is probable to do, though it requires a redesign of all a program for industrial systems,” CSO.com.au reported during a time.

Cyber confidence researcher and CEO of Taia Global, Jeffrey Carr, said a Kaspersky-made secure handling complement for industrial control systems “makes a lot of sense” and would substantially be in high demand, though he also points to Kaspersky’s “close attribute to Russia’s confidence services”.

“Under Russian law, a FSB could ask Kaspersky to embody a backdoor in a secure O/S and a association would be compulsory to comply. In fact, we can’t suppose a FSB blank out on such an event for comprehension collection opposite intensity business among a Commonwealth of Independent States, India, China, South Africa and others.”

Taia’s research (PDF) of Russian law and a implications for Kaspersky Lab products was linked-to in a new [[XREF: http://www.wired.com/dangerroom/2012/07/ff_kaspersky/all/
|Wired profile|]] of Mr Kaspersky that highlighted his connectors to a Kremlin and a confidence arm, a FSB.

Kaspersky responded to a square with a extensive list of corrections, including that a association supposing ‘expertise and zero more’.

Follow @CSO_Australia and pointer adult to a CSO Australia newsletter.