Skip to main content

Stuxnet

Chevron confirms 2010 Stuxnet hit

posted onNovember 12, 2012
by l33tdawg

Chevron becomes the first U.S. company to confirm a network hit by the Stuxnet virus, an incident that reportedly occurred back in 2010 when the malware – designed to interfere with critical infrastructure operations – was discovered.

CIO Journal, Wall Street Journal's tech news service, broke the news Thursday afternoon, and interviewed Mark Koelmel, the oil giant's general manager of the earth sciences department.

Prof casts doubt on Stuxnet's accidental 'great escape' theory

posted onSeptember 13, 2012
by l33tdawg

An expert has challenged a top theory on how the infamous Stuxnet worm, best known for knackering Iranian lab equipment, somehow escaped into the wild.

New York Times journalist David Sanger wrote what's become the definitive account of how Stuxnet was jointly developed by a US-Israeli team. The sophisticated malware was deployed to sabotage high-speed centrifuges at Iran's nuclear fuel processing plant by infecting and commandeering the site's control systems.

Stuxnet: 'Moral crime' or proportionate response?

posted onJuly 27, 2012
by l33tdawg

Delegates at the Black Hat conference in Las Vegas are sharply split on the merits (or otherwise) of malware like Stuxnet that can be used offensively to take down infrastructure.

Stuxnet was the first malware that was publicly acknowledged to have been designed to take down physical equipment – in this case, Siemens supervisory control and data acquisition (SCADA) systems. According to recent reports it was developed by the US and Israel as part of Operation Olympic Games, a malware program started by former President Bush and expanded by the current administration.

Flame code linked to Stuxnet virus, experts say

posted onJune 13, 2012
by l33tdawg

The Flame cyber-attack that targeted computers across the Middle East has been linked to the Stuxnet worm, which is believed to have been orchestrated by the US and Israel to attack Iranian nuclear centres.

Speaking at the Reuters Global Media and Technology Summit on 11 June, Eugene Kaspersky, chief executive of the Russian security firm that bears his name and which discovered the Flame virus in May, said his team of researchers have found that Flame shares an almost identical piece of code with a 2009 version of Stuxnet.

Duqu written using old school object oriented C

posted onMarch 20, 2012
by l33tdawg

When Kaspersky Labs analysed the Duqu Trojan early last month, they were stumped by a block of code that appeared to be previously unseen programming language. It seems now that the language was not new, but rather an old one. A custom object oriented C framework compiled with MSVC 2008 including options to minimise size and expand only when activated in line.