Main » 2011 » Март » 16 » Stuxnet still got to the Iranian nuclear plant in Bushehr
10:46
Stuxnet still got to the Iranian nuclear plant in Bushehr


Today we have news that the official Iranian news agency reported the defeat of some computer systems of the Iranian nuclear plant complex worm Stuxnet. Previously, experts have stated that this malicious code is "locked up" under the industrial facilities, and immediately found the experts who say that this worm was created to destroy Iran's nuclear plant. It is clear that speculation on this subject are conducted in a variety of media, from a very serious publications to the "yellow" press, but as yet no evidence that Stuxnet created for Iran.

Mahmoud Jafari, head of the nuclear plant Bushehri, argues that although the worm and hit some of the computer systems of production, but did not cause any harm to the principal systems of the plant.

Now there are two main views of experts in computer security, what about the worm. First - «Stuxnet not necessarily created by someone to destroy Iran's industrial capacity" and the second - «Stuxnet created by more than one attacker, but a whole complex of professionals well versed in the operation of commercial proprietary software, especially software."

The last opinion is based on the fact that Stuxnet, firstly, is an extremely complicated structure, over which still employ experts. Secondly, the code Stuxnet no individual "tags" that are inherent in almost any software that was created by individuals. In general, the likelihood that Stuxnet created by a lone hacker is zero.

And yet - the same experts (eg, Paul Ferguson of TrendMicro) believe that with the advent of such a worm as Stuxnet, appeared in the world is really serious cyber-weapon, which does not steal someone's out there credit card numbers, and can lead to very serious accident at a hazardous industrial sites. This type of threat, according to the same Ferguson, is "totally new, and this is the reason that many experts have begun literally to intimidate the government to then start taking serious security measures."

Stuxnet attracted and domestic experts. "Attackers have tried to develop its program so that it attracted as little attention. Method of infection Win32/Stuxnet also unique because it uses a previously unknown software vulnerabilities. A possible penetration of the virus on your PC via USB-drives allowing you to quickly get a high prevalence ", - commented Alexander Matrosov, head of virus research and analytics Russian Mission Eset.

It is worth noting that rumors about the direction Stuxnet on Iran could well prove to be totally unfounded, since the most common until the virus in the United States, then already in Iran. Russia is in third place.

There are, of course, another view - this has been mentioned here.

Via news.yahoo.com and CNET

UPDATE Alexander Matrosov, head of virus research and analytics Russian Mission Eset, provided new statistics on the spread of the virus, for which he thanks a lot. Here's the newest statistics, where it is clear that Iran still leads on the list:

Iran - 52,2%
Indonesia - 17,4%
India - 11,3%

A little more information on the site esetnod32.ru here.

Finally, the opinion of Alexander, which was "locked up" the virus: "My personal opinion Bushehr could be only one of the goals, but nothing indicates that she is the only or principal. For example, in Germany there were several cases of infection on plant. I agree with the opinion expressed by my colleagues today in our English-language blog (http://blog.eset.com/2010/09/25/cyberwar-cyberhisteria) ».

Alexander, thanks again for the info!
Views: 336 | Added by: w1zard | Rating: 0.0/0
Total comments: 0
Имя *:
Email *:
Код *: