The highly sophisticated Stuxnet virus is still running rampant at Iranian nuclear facilities according to experts monitoring the nation's response to the attack.
Researchers are basing their assessment of the level of infestation on the sharp and continued increase in internet traffic from Iran to websites dedicated to eradicating the virus.
Stuxnet is a highly sophisticated designer-virus that wreaks havoc with Supervisory Control and Data Acquisition systems (SCADA) that provide operations control for critical infrastructure and production networks.
Reports that Stuxnet has the Iranian nuclear program in utter chaos are in stark contrast to President Mahmoud Ahmadinejad's assertion that the aspiring nuclear power has the malware contained.
FoxNews reported that, "Eric Byres, a computer expert who has studied the worm, said his site was hit with a surge in traffic from Iran, meaning that efforts to get the two nuclear plants to function normally have failed. The web traffic, he says, shows Iran still hasn’t come to grips with the complexity of the malware that appears to be still infecting the systems at both Bashehr and Natanz."
Security expert Jeffrey Carr of Taia Global, who had previously proposed alternatives to the notion that the United States or Israel created the Stuxnet virus to target Iranian centrifuges, now strongly believes her has uncovered data that indicates the malware originated in China.
The suspicious chain of events outlined include China's illegal acquisition of the Microsoft Windows source code, the manufacture of key centrifuge components in China, and the timing of an announcement by the Chinese firm Rising Antivirus International which leads Carr to believe they may have been the ones who actually designed the virus.