4.8 • 1K Ratings
🗓️ 29 January 2020
⏱️ 39 minutes
🧾️ Download transcript
Triton, Part 2: The World’s Most Dangerous Malware
Click on a timestamp to play from that location
0:00.0 | Hi, I'm Ran Levy. Welcome back to Malicious Life in collaboration with side music. Picture a truly depressing building. |
0:25.8 | It's 10 stories high, built of cement and dreyer than the sky is blue. |
0:32.0 | The pretty wooded areas are than the sky is blue. |
0:46.5 | The pretty wooded areas on either side of the parking lots only serve to enhance just how ugly the building truly is with its water damage, dirty radiators sticking out from the windows, and an extended entryway that looks like it was designed during whatever the worst era of modern art was. |
0:55.0 | And you can see where the motor connects each face of the building with the other faces, |
1:01.0 | as if the whole thing were glued together like the four slices of a gingerbread |
1:06.0 | house. |
1:09.7 | Though it is no architectural masterpiece, this actual building I'm describing to you has housed many talented people doing significant work over the years. |
1:20.0 | The chemists, engineers and technicians who've passed through its halls made notable progress in weapons and ammunition technology throughout the 20th and into the 21st century, when a group of men who met behind those ugly concrete walls |
1:37.2 | managed to create the most dangerous malware in existence today. |
1:50.0 | We left part one of this two-part episode with our hackers having breached the Petro-Rabe Petrochemical |
1:56.7 | plant and uploaded custom malware we now know as Triton onto its most sensitive safety systems. But the pathway that allowed |
2:07.2 | them to do that was fraught with oversights, some obvious, some less so. |
2:14.2 | Those of us from IT are used to using effective, even state-of-the-art tools on computers that are, if not |
2:22.3 | new, probably only a few years old. |
2:25.2 | We can upgrade our tech often because it's not prohibitively expensive and it's mobile. |
2:31.8 | Replacing a laptop, for example, is as easy as buying a new one and dropping your old one in the trash. |
2:40.0 | You can imagine how difficult it is to do this when your machines are 10,000 pounds and connected to a system of dozens, even hundreds of pipes, cables and other 10,000 pounds machines, all running 24-7 all year, |
2:58.0 | because critical infrastructure isn't a 9-to-5 business. |
3:02.4 | Industrial systems can live for decades because of how difficult they are to replace |
3:09.0 | and how necessary they are to the functioning of the machines connected to them. |
3:14.0 | For example, a Schneider safety instrumented system, SIS, is built to stay on for years and years non-stop. There are SISs that have been running longer |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from Malicious Life, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of Malicious Life and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.