It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
In the 20th century, this would have been a job for James Bond. The mission: Infiltrate the highly advanced, securely guarded enemy headquarters where scientists in the clutches of an evil master are secretly building a weapon that can destroy the world. Then render that weapon harmless and escape undetected.
But in the 21st century, Bond doesn't get the call. Instead, the job is handled by a suave and very sophisticated secret computer worm, a jumble of code called Stuxnet, which in the last year has not only crippled Iran's nuclear program but has caused a major rethinking of computer security around the globe. Intelligence agencies, computer security companies and the nuclear industry have been trying to analyze the worm since it was discovered in June by a Belarus-based company that was doing business in Iran. And what they've all found, says Sean McGurk, the Homeland Security Department's acting director of national cyber security and communications integration, is a “game changer.” Read more: www.foxnews.com...
Originally posted by TedHodgson
I want a Cyber Missile for chistmas!
Originally posted by BadBoYeed
Originally posted by TedHodgson
I want a Cyber Missile for chistmas!
you'll shoot your eye out
sorry, couldn't resist
This went on until June of last year, when a Belarusan company working on the Iranian power plant in Beshehr discovered it in one of its machines. It quickly put out a notice on a Web network monitored by computer security experts around the world. Ordinarily these experts would immediately begin tracing the worm and dissecting it, looking for clues about its origin and other details. But that didn’t happen, because within minutes all the alert sites came under attack and were inoperative for 24 hours. “I had to use e-mail to send notices but I couldn’t reach everyone. Whoever made the worm had a full day to eliminate all traces of the worm that might lead us them,” Eric Byres, a computer security expert who has examined the Stuxnet. “No hacker could have done that.”
Stuxnet makes spam networks and credit card schemes seem like child's play. Experts say it can do things like make motors fly to pieces.
Why and how did it spread? Stuxnet attacks a Windows-based program called WinCC, a supervisory control and data acquisition program made by Siemens, a German company. If the worm cannot find a copy of WinnCC, it looks for other USB devices and copies itself onto them. Or it spreads across local networks. Stuxnet has been found on Siemens software at more than a dozen industrial facilities outside Iran. Since these types of control systems are not normally connected to the Internet, speculation is that the worm was either introduced with a USB drive or that it came from one of the laptops of Russian consultants at the nuclear plant.
Originally posted by StealthyKat
reply to post by macman
....it's a worm called stuxnet....it's real
articles.cnn.com...:TECHedit on 2-2-2011 by StealthyKat because: (no reason given)