Stuxnet was pretty wild. Used four zero-day Windows exploits to pretty much guarantee infection, propagated itself onto other computers on the network, and then did nothing unless it detected its host was running Siemens Step7 software connected to a PLC driving centrifuges within a specific range of frequencies specific to uranium enrichment, at which point it would start fucking with the centrifuge speeds to impede enrichment and drastically increase wear while displaying normal readings on operator stations. It was estimated to have destroyed as much as one fifth of Iran’s uranium centrifuges.
Wild indeed
The answer is Stuxnet.
Read up. It’s insane.
I really ‘like’ the usb-cables with all sorts of integrated goodies.
Like a payload deployment, wireless transmission and self destruction. All while Data and power delivery works flawlessly.
Like this. https://shop.hak5.org/products/omg-cable
Lots of Penetration Testing stories on YouTube. Not exactly cyber security but it was still solved with basic cyber security updates (and a few physical ones) I remember one where they just physically waited for six hours in an elevator they turned off with a key they bought on eBay for $5 after putting up an “out of order” sign on the door. Then, when everyone had gone home for the night, they came out and went to the server room and hacked their way through the entire system. They were pros paid by that company to find security holes, and they earned their pay that day.
stuxnet was pretty cray. and the stratfor hack.