Jump to content

Change Mode

Stuxnet Malware Is 'weapon' Out To Destroy ... Iran's Bush

Tx Redneck

Recommended Posts



Cyber security experts say they have identified the world's first known cyber super weapon designed specifically to destroy a real-world target – a factory, a refinery, or just maybe a nuclear power plant.


The cyber worm, called Stuxnet, has been the object of intense study since its detection in June. As more has become known about it, alarm about its capabilities and purpose have grown. Some top cyber security experts now say Stuxnet's arrival heralds something blindingly new: a cyber weapon created to cross from the digital realm to the physical world – to destroy something.


At least one expert who has extensively studied the malicious software, or malware, suggests Stuxnet may have already attacked its target – and that it may have been Iran's Bushehr nuclear power plant, which much of the world condemns as a nuclear weapons threat.

Please read on, it's very intriguing.

Link to post
Share on other sites

yup...sounds like the spy stuff you read in novels.

care to guess which one? My first guess would be the U.S. and my second would be the Israeli's


I put the Israeli's @ #1 then us but I concur that those are the first two I'd suspect.
Link to post
Share on other sites

Iran nuke SCADAs saturated with Stuxnet infection





However, evidence continues to pile up that Gregg was right on:


Officials in Iran have confirmed that the Stuxnet worm infected at least 30,000 Windows PCs in the country ... the total number of infected Windows PCs may be considerably larger.


Iran's Atomic Energy Organization ... met this week to discuss how to remove the malware. ... Stuxnet has been attacking SCADA systems since at least January. ... Government officials said that "serious damage that caused damage and disablement" had been reported.


So, it's looking more and more like Gregg's angle was justified. Time will tell, I suppose.



It's hugely significant that Iran is in fact acknowledging the problem now. The worry is that this 30,000 datum is actually way under-played. As Richard Silverstein notes:


Until now, western security experts were the only ones reporting on ... Stuxnet. No Iranian sources were willing to speak publicly. ... But the fact that this article quotes “Iranian nuclear experts” confirms that the worm has infected Iran’s nuclear complexes. The only thing left to know is whether the most damaged site was Natanz, the only known plant enriching uranium which might be used in producing a nuclear weapon.


Why would anyone believe that the 30,000 figure is accurate? It's a reasonable assumption that the regime would under-report the extent of the infection.



Naturally, there are those who see the hand of Israel behind the curtain. The pseudonymous T.S. caused howls of rage in the Economist's comments section:


Its unusual sophistication ... has prompted speculation that it is the work of a well-financed team working for a nation state, rather than a group of rogue hackers. ... This, in turn, has led to suggestions that Israel, known for its high-tech prowess and (ahem) deep suspicion of Iran's nuclear programme, might be behind it.


If Stuxnet has been deliberately aimed at Iran, one possible target is its Bushehr nuclear reactor ... controlled by Siemens systems, including the WinCC software that Stuxnet targets. ... A rival theory is that the target was Iran's uranium-enrichment plant at Natanz, and that Stuxnet successfully shut down some of its centrifuges in early 2009.

Link to post
Share on other sites
  • 1 year later...

Obama Order Sped Up Wave of Cyberattacks Against Iran




WASHINGTON — From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.


Iran Confirms Attack by Virus That Collects Information (May 30, 2012)

Facing Cyberattack, Iranian Officials Disconnect Some Oil Terminals From Internet (April 24, 2012)


Mr. Obama decided to accelerate the attacks — begun in the Bush administration and code-named Olympic Games — even after an element of the program accidentally became public in the summer of 2010 because of a programming error that allowed it to escape Iran’s Natanz plant and sent it around the world on the Internet. Computer security experts who began studying the worm, which had been developed by the United States and Israel, gave it a name: Stuxnet.

Link to post
Share on other sites

Says here that Stuxnet and the Flame virus were divised by USA, Isreal and Britain as a cyber attack to stop Iran's nuclear program.




Far as I see it they are going about it all wrong and going to do nothing more that coax a nuclear war.

Why not talk things out first?


Tehran has repeatedly said that as a member of the nuclear Non-Proliferation Treaty (NPT), it can develop a full nuclear fuel cycle, and, if this is recognised, talks with the permanent members of the U.N. Security Council - Britain, France, Russia, China, the United States - and Germany (the P5+1) can succeed.


"If the other side agrees to recognise Iran's (nuclear) rights based on international regulations, Iran is ready to negotiate anything," Ali Akbar Velayati, an adviser to Iran's Supreme Leader Ayatollah Ali Khamenei was quoted as saying by the official IRNA news agency on Thursday. (Writing by Zahra Hosseinian; Editing by Jon Hemming)

Link to post
Share on other sites


This topic is now archived and is closed to further replies.

  • Create New...