Skip to main content

Stuxnet

India shuts server linked to Duqu computer virus

posted onNovember 8, 2011
by l33tdawg

Indian authorities are investigating a computer server in Mumbai for links to the Duqu malicious software that some security experts warned could be the next big cyber threat.

Web Werks, a Mumbai-based Web-hosting company, said it had given an image of the suspicious virtual private server to officials from the Indian Computer Emergency Response Team (CERT-In), after security firm Symantec Corp found the server was communicating with computers infected with the Duqu virus.

Duqu not created by authors of Stuxnet worm

posted onNovember 1, 2011
by l33tdawg

The design similarities between the recently-publicised Duqu malware and the infamous Stuxnet worm that caused widespread alarm more than a year ago have been hugely exaggerated, an analysis by Dell SecureWorks has concluded.

The essence of the company’s strip-down analysis is that despite some common features, Duqu and Stuxnet have been designed to do different jobs, one very targeted, the other more general.

Russia blames US and Israel for Stuxnet worm

posted onSeptember 26, 2011
by l33tdawg

Russia has for the first time laid the blame for the Stuxnet worm at the door of the US and Israel, describing it as "the only proven case of actual cyber-warfare."

In translated comments reported by the AFP agency, foreign ministry security department chief Ilya Rogachyov was blunt about the origins of a piece of malware that has mystified experts since first appearing in June 2010.

How digital detectives deciphered Stuxnet

posted onJuly 11, 2011
by l33tdawg

It was January 2010, and investigators with the International Atomic Energy Agency had just completed an inspection at the uranium enrichment plant outside Natanz in central Iran, when they realized that something was off within the cascade rooms where thousands of centrifuges were enriching uranium.

Natanz technicians in white lab coats, gloves and blue booties were scurrying in and out of the "clean" cascade rooms, hauling out unwieldy centrifuges one by one, each sheathed in shiny silver cylindrical casings.

Stop Software Attacks From Destroying Your Servers

posted onJuly 1, 2011
by l33tdawg

 Stuxnet-style malware that attacks computer hardware could put your company out of business by physically destroying the servers, networking equipment and storage resources in your data center. Unlike Stuxnet, however, this type of malware is easy to create.

That's the stark warning Itzik Kotler issued at the HackInTheBox hacker convention in Amsterdam last month. Kotler is the chief technology officer of the information security company Security Art.