Stuxnet is a malicious computer worm first uncovered in 2010 and thought to have been in development since at least 2005.
FactSnippet No. 1,602,261 |
Stuxnet is a malicious computer worm first uncovered in 2010 and thought to have been in development since at least 2005.
FactSnippet No. 1,602,261 |
Stuxnet reportedly compromised Iranian PLCs, collecting information on industrial systems and causing the fast-spinning centrifuges to tear themselves apart.
FactSnippet No. 1,602,262 |
Stuxnet has three modules: a worm that executes all routines related to the main payload of the attack; a link file that automatically executes the propagated copies of the worm; and a rootkit component responsible for hiding all malicious files and processes, to prevent detection of Stuxnet.
FactSnippet No. 1,602,263 |
Stuxnet, discovered by Sergey Ulasen, initially spread via Microsoft Windows, and targeted Siemens industrial control systems.
FactSnippet No. 1,602,264 |
On 1 June 2012, an article in The New York Times said that Stuxnet is part of a US and Israeli intelligence operation named Operation Olympic Games, devised by the NSA under President George W Bush and executed under President Barack Obama.
FactSnippet No. 1,602,265 |
Kaspersky Lab experts at first estimated that Stuxnet started spreading around March or April 2010, but the first variant of the worm appeared in June 2009.
FactSnippet No. 1,602,266 |
Second variant, with substantial improvements, appeared in March 2010, apparently because its authors believed that Stuxnet was not spreading fast enough; a third, with minor improvements, appeared in April 2010.
FactSnippet No. 1,602,267 |
Stuxnet attacked Windows systems using an unprecedented four zero-day attacks.
FactSnippet No. 1,602,268 |
Stuxnet is unusually large at half a megabyte in size, and written in several different programming languages which is irregular for malware.
FactSnippet No. 1,602,269 |
Entirety of the Stuxnet code has not yet been disclosed, but its payload targets only those SCADA configurations that meet criteria that it is programmed to identify.
FactSnippet No. 1,602,270 |
Stuxnet installs malware into memory block DB890 of the PLC that monitors the Profibus messaging bus of the system.
FactSnippet No. 1,602,271 |
Prevention of control system security incidents, such as from viral infections like Stuxnet, is a topic that is being addressed in both the public and the private sector.
FactSnippet No. 1,602,272 |
Experts believe that Stuxnet required the largest and costliest development effort in malware history.
FactSnippet No. 1,602,273 |
Symantec estimates that the group developing Stuxnet would have consisted of between five and thirty people, and would have taken six months to prepare.
FactSnippet No. 1,602,274 |
The Guardian, the BBC and The New York Times all claimed that experts studying Stuxnet believe the complexity of the code indicates that only a nation-state would have the abilities to produce it.
FactSnippet No. 1,602,275 |
The leading force behind Stuxnet is the cyber superpower – there is only one; and that's the United States.
FactSnippet No. 1,602,276 |
The Institute for Science and International Security suggests, in a report published in December 2010, that Stuxnet is a reasonable explanation for the apparent damage at Natanz, and may have destroyed up to 1,000 centrifuges sometime between November 2009 and late January 2010.
FactSnippet No. 1,602,277 |
LEU quantities could have certainly been greater, and Stuxnet could be an important part of the reason why they did not increase significantly.
FactSnippet No. 1,602,278 |
American presidential advisor Gary Samore smiled when Stuxnet was mentioned, although American officials have suggested that the virus originated abroad.
FactSnippet No. 1,602,279 |
In 2009, a year before Stuxnet was discovered, Scott Borg of the United States Cyber-Consequences Unit suggested that Israel may prefer to mount a cyber-attack rather than a military strike on Iran's nuclear facilities.
FactSnippet No. 1,602,280 |
Fact that John Bumgarner, a former intelligence officer and member of the United States Cyber-Consequences Unit, published an article prior to Stuxnet being discovered or deciphered, that outlined a strategic cyber strike on centrifuges and suggests that cyber attacks are permissible against nation states which are operating uranium enrichment programs that violate international treaties gives some credibility to these claims.
FactSnippet No. 1,602,281 |
Frank Rieger stated that three European countries' intelligence agencies agreed that Stuxnet was a joint United States-Israel effort.
FactSnippet No. 1,602,282 |
In July 2013, Edward Snowden claimed that Stuxnet was cooperatively developed by the United States and Israel.
FactSnippet No. 1,602,284 |
An early version of Stuxnet contained code to propagate infections via USB drives that is nearly identical to a Flame module that exploits the same vulnerability.
FactSnippet No. 1,602,285 |
Stuxnet later plead guilty for lying to FBI agents pursuing an investigation into the leak.
FactSnippet No. 1,602,286 |