It looks like you're using an Ad Blocker.

Please white-list or disable in your ad-blocking tool.

Thank you.


Some features of ATS will be disabled while you continue to use an ad-blocker.


Was Stuxnet built to attack Iran's nuclear program?

page: 2
<< 1   >>

log in


posted on Sep, 28 2010 @ 08:46 AM
Here is some more information about Stuxnet and further implications toward infrastructure systems.

Stuxnet Attack Exposes Inherent Problems In Power Grid Security

While the Stuxnet worm attack has raised the bar for targeted attacks on the critical infrastructure, it's not the first time the power grid has been in the bull's eye. Attacks against these systems are actually quite common -- it's just that they are mostly kept under wraps and rarely face public scrutiny like Stuxnet has.

Nearly 60 percent of critical infrastructure providers worldwide, including oil and gas, electric, and telecommunications, say they have been targeted by "representatives" of foreign governments, according to a study published earlier this year by The Center for Strategic and International Studies and commissioned by McAfee. More than half of the respondents had experienced a targeted, stealthy attack akin to the Aurora attacks that hit Google, Adobe, and nearly 30 other companies earlier this year. In addition, nearly 90 percent of the respondents said their networks had been infected with malware, and more than 70 percent had been hit with low-level DDoS attacks and vandalism, insider threats, leakage of sensitive data, and phishing or pharming.

posted on Sep, 29 2010 @ 12:13 PM
Looks like the UK has been afflicted by the same virus/ worm; SKY and BBC news have just launched a story about the matter and claim that many sources are blaming Israel. Israel will neither confirm nor deny. Hmm. And apparently many commentators are saying they fear a retaliation by Iran.

Doomsday scenario? Just in time for that whacky prediction of a full disclosure / aerial intervention by UFOs on October 13th....

Come on ATS - wake up and smell the false flag event!

The UK gov has said it is NOT a lone hacker, but a state sponsored event. THAT'S A BIG ACCUSATION right there...

edit on 29-9-2010 by FlyInTheOintment because: (no reason given)

posted on Sep, 29 2010 @ 09:21 PM
reply to post by BomSquad

how about this just breaking, involving the possible reference to the book of "Esther" in the bible, looks like its not over yet....

posted on Sep, 29 2010 @ 09:32 PM
Seems like the Bushehr plant launch has been delayed till 2011. I red the Iranians even had to ask foreign specialists how to deal with the worm!,[and then whe had the incident at the Natanz plant earlier in 2009]... Good work people at unit 8200 , you're brilliant!

edit on 29-9-2010 by Foppezao because: (no reason given)

posted on Sep, 30 2010 @ 09:03 AM
reply to post by freetree64

I am curious about the reasoning outlined at the end of the article you linked to:

But other Israeli experts said they doubted Israel’s involvement. Shai Blitzblau, the technical director and head of the computer warfare laboratory at Maglan, an Israeli company specializing in information security, said he was “convinced that Israel had nothing to do with Stuxnet.”

“We did a complete simulation of it and we sliced the code to its deepest level,” he said. “We have studied its protocols and functionality. Our two main suspects for this are high-level industrial espionage against Siemens and a kind of academic experiment.”

Mr. Blitzblau noted that the worm hit India, Indonesia and Russia before it hit Iran, though the worm has been found disproportionately in Iranian computers. He also noted that the Stuxnet worm has no code that reports back the results of the infection it creates. Presumably, a good intelligence agency would like to trace its work.

It seems suspicious to me that the head of a computer warfare laboratory for an Israeli company specializing in information security would suggest that this was only espionage or an academic experiment based on the fact that it hit other countries first and that the worm does not "report back".

I would suggest that any intelligence agency looking to avoid repercussions for the attack would muddy the waters as much as possible as to the origin of the attack. I would think that the most basic of techniques to do this would be to superficially infect other targets first and make sure that nothing could point back to the origins of the attack by NOT having the attack report back on success or failure.

I know that the intelligence agency would want to know if their attack succeeded or failed, but I think it would be more important to mask exactly who made the attack. It is better, from their point of view, to keep the world guessing about who launched the attack, than to get solid confirmation that the attack worked in the first place. Especially since this kind of attack could only be a delaying action and would probably never actually stop the plant from going online, by itself. I would imagine that the purpose of this kind of attack would be to buy enough time to find a more permanent solution to the problem.

Or I could be way off in left field...who knows? lol

posted on Oct, 4 2010 @ 08:08 AM
I just find that this gets more and more interesting...

Why did Stuxnet worm spread?

Computerworld - Stuxnet's inability to stay stealthy may be fall-out from a failure to hit its intended targets last year, security researchers said today.

The worm, which was designed to infiltrate heavy-duty industrial control programs that monitor and manage factories, oil pipelines, power plants and other critical installations, only popped onto researchers' radars this summer, nearly a year after it was likely first launched.

"Obviously, it spread beyond its intended target or targets," said Roel Schouwenberg, a senior antivirus researcher at Kaspersky Lab, one of the two security companies that has spent the most time analyzing Stuxnet.

posted on Oct, 4 2010 @ 12:51 PM
Iran is now reporting that they have arrested spies in connection to the Stuxnet worm outbreak...

Iran arrests 'spies' after Stuxnet attacks on nuclear program

Computerworld - An Iranian intelligence official Saturday said that authorities had detained several "spies" connected to cyber attacks against its nuclear program.

According to the Tehran-based Mehr News Agency, Heydar Moslehi, Iran's minister of intelligence, said that "enemy spy services" were responsible for Stuxnet, the sophisticated worm that has infected at least 30,000 Windows PCs in the country, including some at the Bushehr nuclear power plant.

Moslehi claimed his ministry had uncovered "destructive activities of the arrogance [of the West] in cyberspace", and said that defensive measures had been put into place to secure Iran's information systems and its nuclear facilities.

This just keeps getting more and more interesting...

posted on Oct, 6 2010 @ 07:03 AM
More news on the Stuxnet worm...

Iran is really stepping up the rhetoric (not that they don't have the right to).

Iran blames Stuxnet worm on Western plot

Computerworld - Iran today made its strongest statement yet that it believes a Western plot is behind the Stuxnet worm that has infected tens of thousands of computers in the country, including some at its sole nuclear power plant.

In a Tuesday press briefing, Iran's foreign ministry spokesman, Ramin Mehmanparast, blamed unnamed Western countries for creating and distributing the worm.

"It is hard for the Western states to tolerate the progress of Iran's peaceful nuclear program," said Mehmanparast in a summary of the briefing posted to the Ministry of Foreign Affairs Web site.

posted on Nov, 16 2010 @ 07:35 AM
reply to post by BomSquad

Discussion continuring here...

posted on Jun, 1 2012 @ 11:52 AM
It turns out the US has admitted that it was a joint US-Israeli mission.

US officials confirm Stuxnet was a joint US-Israeli op

Cyberattacks on Iranian nuclear program were a US-Israel effort started under the Bush administration and continued by President Obama, The New York Times reports.

The confirmation from Obama-administration officials that Stuxnet was a joint US-operation comes from extracts from a forthcoming book, Confront and Conceal: Obama's Secret Wars and Surprising Use of American Power, by David Sanger that's due to be published next week.

I am beginning to wonder if the newly acknowledged Flame worm was a initial attempt to make such a worm to user cyber-warfare to covertly attack Iran and its energy programs.

posted on Feb, 26 2013 @ 01:06 PM
Researchers say Stuxnet was deployed against Iran in 2007

Researchers at Symantec Corp (SYMC.O) have uncovered a version of the Stuxnet computer virus that was used to attack Iran's nuclear program in November 2007, two years earlier than previously thought.

The virus was being developed early as 2005, when Iran was still setting up its uranium enrichment facility, said Symantec researcher Liam O'Murchu. That facility went online in 2007.

"It is really mind blowing that they were thinking about creating a project like that in 2005," O'Murchu told Reuters in ahead of the report's release at the RSA security conference, an event attended by more than 20,000 security professionals, in San Francisco on Tuesday.

Symantec had previously uncovered evidence that planning for Stuxnet began in 2007. The New York Times reported in June 2012 that the impetus for the project dated back to 2006, when U.S. President George W. Bush was looking for options to slow Iran's nuclear ambitions.

I keep coming back here to my original thread to update with any news articles related to stuxnet that I find interesting. This definitely qualifies.

top topics

<< 1   >>

log in