Stuxnet worm ‘targeted high-value Iranian assets’

One of the most sophisticated pieces of malware ever detected was probably targeting “high value” infrastructure in Iran, experts have told the BBC.Stuxnet’s complexity suggests it could only have been written by a “nation state”, some researchers have claimed.It is believed to be the first-known worm designed to target real-world infrastructure such as power stations, water plants and industrial units.It was first detected in June and has been intensely studied ever since.
http://www.bbc.co.uk/news/technology-11388018Also see:Iranian nuclear plants likely target of foiled cyber sabotage
Iran was the likely target of a sophisticated computer worm designed to sabotage factories and infrastructure which was almost certainly the work of a national government agency, security experts told the Guardian yesterday.According to the security company Symantec, 60% of the computers infected by the Stuxnet computer worm are in Iran, which is where the malicious software, known as malware, was discovered by a Belarussian computer security company.
http://www.guardian.co.uk/world/2010/sep/25/iran-cyber-hacking-nuclear-plantsMalware Hits Computerized Industrial Equipment
The technology industry is being rattled by a quiet and sophisticated malicious software program that has infiltrated factory computers.The malware, known as Stuxnet, was discovered in mid July, at least several months after its creation, by VirusBlokAda, a Belarussian computer security company that was alerted by a customer.
http://bits.blogs.nytimes.com/2010/09/24/malware-hits-computerized-industrial-equipment/Editorial: Worms will turn
It could be the brainchild of a particularly nasty Bond-supervillain: Stuxnet, a new computer worm, has wriggled its way into software around the world. How many computers are infected is unclear. After a year of investigating, security teams have still not fully fathomed its mysteries.Unlike its predecessors, Stuxnet does not attack the computers that host it, but uses them as a base from which to attack Siemens’ software that runs industrial operating systems. Once the worm seizes control, it can sabotage anything run via the computer’s network – from power-stations and pipelines to financial transactions and satellites.
http://www.ft.com/cms/s/0/455675b4-c809-11df-ae3a-00144feab49a.htmlCyber attack appears to target Iran-tech firms
A computer virus that attacks a widely used industrial system appears aimed mostly at Iran and its sophistication suggests a state may have been involved in creating it, Western cyber security companies said on Friday.Kevin Hogan, Senior Director of Security Response at Symantec, told Reuters 60 percent of the computers worldwide infected by the so-called Stuxnet worm were in Iran, indicating industrial plants in that country were the target.
http://uk.reuters.com/article/idUKTRE68N3G320100924
http://in.reuters.com/article/idINIndia-51719920100924

Leave a Reply

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.