Results 1 to 20 of 55

Thread: Stuxnet: Target Bushehr?

Hybrid View

Previous Post Previous Post   Next Post Next Post
  1. #1
    Council Member Dayuhan's Avatar
    Join Date
    May 2009
    Location
    Latitude 17° 5' 11N, Longitude 120° 54' 24E, altitude 1499m. Right where I want to be.
    Posts
    3,137

    Default A US/Israeli cyber attack on Iran's nuclear program?

    Interesting NYT article claiming that the Stuxnet worm was aimed specifically at Iranian centrifuges...

    http://www.nytimes.com/2011/01/16/wo...ewanted=1&_r=1

    Behind Dimona’s barbed wire, the experts say, Israel has spun nuclear centrifuges virtually identical to Iran’s at Natanz, where Iranian scientists are struggling to enrich uranium. They say Dimona tested the effectiveness of the Stuxnet computer worm, a destructive program that appears to have wiped out roughly a fifth of Iran’s nuclear centrifuges and helped delay, though not destroy, Tehran’s ability to make its first nuclear arms.

    To check out the worm, you have to know the machines,” said an American expert on nuclear intelligence. “The reason the worm has been effective is that the Israelis tried it out.

    Though American and Israeli officials refuse to talk publicly about what goes on at Dimona, the operations there, as well as related efforts in the United States, are among the newest and strongest clues suggesting that the virus was designed as an American-Israeli project to sabotage the Iranian program."
    Our concern with such attacks has typically been that they would be used against the US: like other swords, this one apparently has two edges.
    Last edited by davidbfpo; 01-16-2011 at 12:20 PM. Reason: Use quote marks rather than italics

  2. #2
    Council Member
    Join Date
    Aug 2010
    Posts
    98

    Default

    Quote Originally Posted by Dayuhan View Post
    Our concern with such attacks has typically been that they would be used against the US: like other swords, this one apparently has two edges.
    Where do you see any evidence of that? Also, if this was some US/Israeli effort, it was damned sloppy in that it was so easily traced. Leaving clues in code it amateur at best, and this thing has been seriously picked apart. Neither of which say good things, although the results are very much worthy of applause. Personally I don't care who did this, I'm just glad they did. We need more like that.

  3. #3
    Council Member
    Join Date
    Mar 2009
    Location
    Florida
    Posts
    44

    Default

    Mikko Hyppönen, Chief Research Officer at F-Secure, offers a good summary of why Stuxnet is unique in terms of malware design and execution: http://www.youtube.com/watch?v=gFzadFI7sco.
    Erich G. Simmers
    www.weaponizedculture.org

  4. #4
    Council Member AdamG's Avatar
    Join Date
    Dec 2005
    Location
    Hiding from the Dreaded Burrito Gang
    Posts
    3,096

    Default

    The Stuxnet software worm repeatedly sought to infect five industrial facilities in Iran over a 10-month period, a new report says, in what could be a clue into how it might have infected the Iranian uranium enrichment complex at Natanz.
    http://www.nytimes.com/2011/02/13/sc..._r=2&src=twrhp
    A scrimmage in a Border Station
    A canter down some dark defile
    Two thousand pounds of education
    Drops to a ten-rupee jezail


    http://i.imgur.com/IPT1uLH.jpg

  5. #5
    Council Member
    Join Date
    Mar 2009
    Location
    Florida
    Posts
    44

    Default

    The actual report can be found here: http://www.symantec.com/connect/ko/b...sier-available.

    It is worth the read. Missing from the news story was that several vendors contributed samples and data on the worm including ESET, F-Secure, Kaspersky Labs, Microsoft, McAfee, and Trend.
    Erich G. Simmers
    www.weaponizedculture.org

  6. #6
    Council Member davidbfpo's Avatar
    Join Date
    Mar 2006
    Location
    UK
    Posts
    13,366

    Default Stuxnet: targeting Iran's nuclear programme

    An IISS Strategic Comment, which provides a good IMHO overview, starts:
    ..it is essentially a delaying tactic and has not dimmed the country’s resolve to develop nuclear capabilities..
    and ends with:
    Cyber sabotage is likely only to buy time for the international community to devise alternative policy responses to Iran’s nuclear programme. In the meantime, sanctions and negotiations are likely to remain their priority.
    Link:http://www.iiss.org/publications/str...ear-programme/
    davidbfpo

  7. #7
    Council Member Cannoneer No. 4's Avatar
    Join Date
    May 2007
    Location
    Georgia
    Posts
    140

    Default Hackers release Stuxnet's decompiled code online

    http://www.rockto.com/launcher/33781...ed-code-online

    The Anonymous group released the Stuxnet code on 13 February, after finding it in a database of e-mails it stole from HBGary. “First public Stuxnet decompile is to be found here,” one representative of the group wrote over Twitter.

Similar Threads

  1. Snipers Sniping & Countering them
    By DDilegge in forum Trigger Puller
    Replies: 226
    Last Post: 04-30-2019, 08:59 AM
  2. The Roles and Weapons with the Squad
    By Faceman in forum Trigger Puller
    Replies: 977
    Last Post: 05-25-2014, 01:49 AM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •