Most Sophisticated Malware Ever Targets Iran (1 Viewer)


Hey how you doin
Most Sophisticated Malware Ever Targets Iran

Stuxnet begins to learn at a geometric rate. It becomes self-aware at 2:14 a.m. Eastern time

Four things about Stuxnet are particularly noteworthy, according to experts consulted by ComputerWorld. One, it appears to be the most sophisticated malware anyone has ever seen. Two, because of that, researchers do not believe it could have been created by a private group. They think it's the handiwork of a nation-state. Third, it could control real world machinery, like, say, a power plant. Fourth, it appears to have targeted Iran.

"What we're seeing with Stuxnet is the first view of something new that doesn't need outside guidance by a human - but can still take control of your infrastructure. This is the first direct example of weaponized software, highly customized and designed to find a particular target," he said. "The implications of Stuxnet are very large, a lot larger than some thought at first... It's the type of threat we've been worried about for a long time."

Most Sophisticated Malware Ever Targets Iran - Alexis Madrigal - Technology - The Atlantic


lol, sounds like it could be the end to a lot more than the internet wino, if it can control a fucking power plant.

Those pesky goddamn Jews and their zog nations don't care what happens as long as Iran falls somehow.


Thats pretty much what I was thinking.

MOSSAD wanted it built. The US built it for free for them to use on whoever they want.

Israel is fucking insane.


What was the name of the Networks in the Terminator movies? Wasn't is something just like Stuxnet? LOL.. This is so messed up.

Torque Button

"boo fucking hoo" "Die in a fire"
And of course a N|gg3r riding a stolen bicycle carried it over the Iranian border undetected in the black of night.


Hey how you doin
Once in a computer system running on Windows software, Stuxnet checked for any of three Siemens SCADA programmable logic controllers (PLCs) that manage functions such as cooling or turbine speed, Schouwenberg said.

If there was a match, Stuxnet automatically took over control of the PLC and hid any changes from workers operating or managing a system, according to Schouwenberg.

"When the operator looks at the plant, everything will look just fine," Schouwenberg said. "Meanwhile, the machine will be overloading. Its ultimate goal is cyber sabotage."

"Stuxnet manipulates a fast running process," Langner explained at his website. "We can expect that something will blow up soon. Something big."

The software saboteur has been found lurking on systems in India, Indonesia, Pakistan and elsewhere, but the heaviest infiltration appeared to be in Iran, according to software security researchers.

"This was assembled by a highly qualified team of experts, involving some with specific control system expertise," Langner said.

"This is not some hacker sitting in the basement of his parents' house. The resources needed to stage this attack point to a nation state."

The pattern of spread correlated somewhat with jobs handled by a firm commissioned to work at nuclear facilities, according to researchers.

Langner suspected Stuxnet's mark was the Bushehr nuclear facility in Iran. Unspecified problems have been blamed for a delay in getting the facility fully operational.


Users who are viewing this thread