Stuxnet Virus Runs Rampant at Iranian Nuclear Facilities

Wednesday, December 15, 2010

Headlines

69dafe8b58066478aea48f3d0f384820

The highly sophisticated Stuxnet virus is still running rampant at Iranian nuclear facilities according to experts monitoring the nation's response to the attack.

Researchers are basing their assessment of the level of infestation on the sharp and continued increase in internet traffic from Iran to websites dedicated to eradicating the virus.

Stuxnet is a highly sophisticated designer-virus that wreaks havoc with Supervisory Control and Data Acquisition systems (SCADA) that provide operations control for critical infrastructure and production networks.

Reports that Stuxnet has the Iranian nuclear program in utter chaos are in stark contrast to President Mahmoud Ahmadinejad's assertion that the aspiring nuclear power has the malware contained.

FoxNews reported that, "Eric Byres, a computer expert who has studied the worm, said his site was hit with a surge in traffic from Iran, meaning that efforts to get the two nuclear plants to function normally have failed. The web traffic, he says, shows Iran still hasn’t come to grips with the complexity of the malware that appears to be still infecting the systems at both Bashehr and Natanz."

Security expert Jeffrey Carr of Taia Global, who had previously proposed alternatives to the notion that the United States or Israel created the Stuxnet virus to target Iranian centrifuges, now strongly believes her has uncovered data that indicates the malware originated in China.

The suspicious chain of events outlined include China's illegal acquisition of the Microsoft Windows source code, the manufacture of key centrifuge components in China, and the timing of an announcement by the Chinese firm Rising Antivirus International which leads Carr to believe they may have been the ones who actually designed the virus.

 

Possibly Related Articles:
3576
Viruses & Malware
SCADA virus China malware Iran Stuxnet Headlines
Post Rating I Like this!
The views expressed in this post are the opinions of the Infosec Island member that posted this content. Infosec Island is not responsible for the content or messaging of this post.

Unauthorized reproduction of this article (in part or in whole) is prohibited without the express written permission of Infosec Island and the Infosec Island member that posted this content--this includes using our RSS feed for any purpose other than personal use.