A tank is designed for war. Infrastructure is designed to serve some other utility. Claiming it should also be hardened against (cyber) war is acknowledging that there is an aggressor performing an attack of war, not that the infrastructure is failing the utility it was designed for.
It's fine to have this view that software should be defect free and hardened against sophisticated nation-state attackers, but it stretches the meaning of "defect" to me. A defect would be serving to fulfill that utility it had been designed for, not succumbing to malicious attackers.
okay, so you think just attaching PLCs to an rs485-to-ethernet adapter and connecting it straight unauthenticated to the internet, and then calling it a day is simply perfectly reasonable, since "well.. cant expect to harden against cyber warfare!! no defect!!!" ?
because this is the kind of stuff infrastructure things do, along with MANY other things. Im sure not all infrastructure does it, but plenty do.
This is not hardening, its BASIC security. any scriptkiddie from same country could find it and cause problems.
How far would you say they should go to stop domestic script kiddies from messing with it? and if script kiddies from other countries mess with it, is it now cyber warfare?
Well, your unsourced assertions sound dramatically incompetent, but the linked article says the Russian cyberattack on Ukraine in 2015 was the first malware caused blackout, and the titular event of the article failed to cause harm, which kind of paints a different picture.
I’ll therefore decline to comment on your assertions. I will acknowledge it’s time to consider Russian interference as expected if you are designing an internet connected system, fine, but it looks like it’s non trivial to fatally compromise these systems already.
depends on what you mean by fatally compromise, much infrastructure across europe, and I would strongly think the US aswell(allthough here I am only familiar with 1 example), it is absolutely trivial to atleast temporarily disable and possibly bring some harm for anyone unauthenticatedly.
I am not saying whether russians are doing it or not, im just saying that its not just victim blaming, and that anyone operating with this level of security is grossly negligant and should be severely punished as criminals
no, thats not the same. If you for example leave your front door open, and the insurance finds out, do you think they will be doing "victim blaming" ?
so lets turn this logic around on those megacorps that leaks personal data, suppose they run an open postgres or mongodb with ALL the customer data, no password or default password, on the open ipv6, is it victimblaming to go after them for this? after all, its the big bad criminals that stole the data?
the truth of the matter is that yes, the ones that take the data are criminals, but so are the one that doesnt take proper pracautions.
Have you actually seen how these infrastructure things operate? many of them have open scada systems directly coupled to the internet. Many of them have sms gateways that just accepts messages from _ANY_ phone number to issue shutdowns.
I know because I have been brought in to look at some of those things as a consultant