YubaNet.com
Tuesday, September 16 2014

            We Deliver News to the Sierra
News Fire News spacer Latest News spacer Regional News spacer California News spacer USA News spacer World News spacer Op-Ed spacer Enviro News spacer Sci Tech News spacer Life spacer Odd News spacer Cartoons spacer
Features The Calendar features features Weather features Sierra NightSky features features features Road Conditions features Home spacer
Sci/Tech
 

The Real Story of Stuxnet

Leaks to the press strongly suggest the United States and Israel were involved

    Google+    

By: IEEE Spectrum Magazine

February 27, 2013 - The computer virus Stuxnet recently demonstrated unprecedentedly masterful and malicious powers by infecting and then actually sabotaging a uranium-enrichment plant in Iran. Among the first to identify the worm was Roel Schouwenberg, an analyst for Moscow-based Kaspersky Lab, a leading computer-security firm. This month's IEEE Spectrum provides an exclusive report based in part on his experiences.

Stuxnet matters because it provides the first known example of state-versus-state cyberwarfare. This was indeed warfare, because it went beyond mere snooping to inflict physical damage. More such weaponry can be expected in the future.

Schouwenberg and his colleagues at Kaspersky Lab and other computer-security firms began sharing information. They learned that other bits of malware had paved the way for Stuxnet, and they even appear to have provoked an attempt on the part of the worm's authors to cover their tracks. That savoir faire hints that Stuxnet was the product of a state-backed initiative; even more decisive was its unprecedented specificity. Unlike malware designed by private players, Stuxnet and its cousins were engineered not merely to hit particular targets but also to leave untargeted systems undisturbed.

No person or state has acknowledged having played a part in designing Stuxnet, but leaks to the press strongly suggest that the United States and Israel were involved. Stuxnet began by targeting Microsoft Windows machines and networks, repeatedly replicating itself. Then it sought out Siemens Step7 software, used to program industrial control systems that operate equipment, such as the centrifuges in Iran's uranium-enrichment plant. Finally, it compromised the programmable logic controllers, causing the fast-spinning centrifuges to tear themselves apart, unbeknownst to the human operators at the plant.

 

Help us bring you more news. Be a real reader: Support YubaNet

By submitting a comment you consent to our rules. You must use your real first and last name, not a nickname or alias. A comment here is just like a letter to the editor or a post on Facebook. Thank you.

 

Latest Headlines

Sci/Tech

Scientists Report First Semiaquatic Dinosaur, Spinosaurus

USGS: 20-Year Study Shows Levels of Pesticides Still a Concern for Aquatic Life in U.S. Rivers and Streams

A tale of two springs

Gaia discovers its first supernova

NASA Research Gives Guideline for Future Alien Life Search

Geomagnetic Storm Category G3 Predicted

Volunteer 'eyes on the skies' track peregrine falcon recovery in California

Increased ocean warming spells trouble for Florida reefs

Dietary Recommendations in the U.S. Tied to Increased Greenhouse Gas Emissions

T. Rex times seven: New dinosaur species is discovered in Argentina


More

 

 

 

 

NEWS . Fire News . Latest . Regional . California . USA . World . Op-Ed . Enviro . Sci/Tech . Life . Odd News . Cartoons
FEATURES . The Calendar .Weather . Sierra NightSky . Horoscope . Road Conditions
YubaNet.com . Advertising. About Us . Support YubaNet . Contact Us . Terms of Use . Privacy

YubaNet.com © 1999-2014
Nevada City, California (530) 478-9600