YubaNet.com
Thursday, July 24 2014

            We Deliver News to the Sierra
News Fire News spacer Latest News spacer Regional News spacer California News spacer USA News spacer World News spacer Op-Ed spacer Enviro News spacer Sci Tech News spacer Life spacer Odd News spacer Cartoons spacer
Features The Calendar features features Weather features Sierra NightSky features features features Road Conditions features Home spacer
Sci/Tech
 

The Real Story of Stuxnet

Leaks to the press strongly suggest the United States and Israel were involved

    Google+    

By: IEEE Spectrum Magazine

February 27, 2013 - The computer virus Stuxnet recently demonstrated unprecedentedly masterful and malicious powers by infecting and then actually sabotaging a uranium-enrichment plant in Iran. Among the first to identify the worm was Roel Schouwenberg, an analyst for Moscow-based Kaspersky Lab, a leading computer-security firm. This month's IEEE Spectrum provides an exclusive report based in part on his experiences.

Stuxnet matters because it provides the first known example of state-versus-state cyberwarfare. This was indeed warfare, because it went beyond mere snooping to inflict physical damage. More such weaponry can be expected in the future.

Schouwenberg and his colleagues at Kaspersky Lab and other computer-security firms began sharing information. They learned that other bits of malware had paved the way for Stuxnet, and they even appear to have provoked an attempt on the part of the worm's authors to cover their tracks. That savoir faire hints that Stuxnet was the product of a state-backed initiative; even more decisive was its unprecedented specificity. Unlike malware designed by private players, Stuxnet and its cousins were engineered not merely to hit particular targets but also to leave untargeted systems undisturbed.

No person or state has acknowledged having played a part in designing Stuxnet, but leaks to the press strongly suggest that the United States and Israel were involved. Stuxnet began by targeting Microsoft Windows machines and networks, repeatedly replicating itself. Then it sought out Siemens Step7 software, used to program industrial control systems that operate equipment, such as the centrifuges in Iran's uranium-enrichment plant. Finally, it compromised the programmable logic controllers, causing the fast-spinning centrifuges to tear themselves apart, unbeknownst to the human operators at the plant.

 

Help us bring you more news. Be a real reader: Support YubaNet

By submitting a comment you consent to our rules. You must use your real first and last name, not a nickname or alias. A comment here is just like a letter to the editor or a post on Facebook. Thank you.

 

Latest Headlines

Sci/Tech

Near Miss: The Solar Superstorm of July 2012

Voyager spacecraft might not have reached interstellar space

Bats use polarised light to navigate

Lives and deaths of sibling stars

To celebrate Chandra's 15th anniversary, four newly processed images of supernova remnants released

Mysterious dance of dwarfs may force a cosmic rethink

Nearsightedness increases with level of education and longer schooling

New View of Mount Rainier's Volcanic Plumbing

Dozens of Fires Plague Oregon (SATELLITE PHOTO)

The rate at which groundwater reservoirs are being depleted is increasing


More

 

 

 

 

NEWS . Fire News . Latest . Regional . California . USA . World . Op-Ed . Enviro . Sci/Tech . Life . Odd News . Cartoons
FEATURES . The Calendar .Weather . Sierra NightSky . Horoscope . Road Conditions
YubaNet.com . Advertising. About Us . Support YubaNet . Contact Us . Terms of Use . Privacy

YubaNet.com © 1999-2014
Nevada City, California (530) 478-9600