What's new

Governments preparing Stuxnet 2.0 malware for nuclear strike

truthlover

BANNED
Joined
Aug 3, 2013
Messages
344
Reaction score
-14
Country
Pakistan
Location
Pakistan
The Israeli and Saudi Arabian governments are working to create a new, even more destructive variant of the notorious Stuxnet malware, according to local Iranian news outletFarsnews.

Farsnews reported that an unnamed source with links inside the Saudi Arabian secret service confirmed the news, warning the two nations plan to use it to further disrupt Iran's nuclear power program.

"Saudi spy chief Prince Bandar bin Sultan bin Abdulaziz Al Saud and director of Israel's Mossad intelligence agency Tamir Bardo sent their representatives to a meeting in Vienna on 24 November to increase the two sides' co-operation in intelligence and sabotage operations against Iran's nuclear program," claimed the unnamed source.

"One of the proposals raised in the meeting was the production of a malware worse than the Stuxnet (a comprehensive US-Israeli program designed to disrupt Iran's nuclear technology) to spy on and destroy the software structure of Iran's nuclear program."

The original Stuxnet malware was uncovered targeting Iranian nuclear systems in 2010, and is believed to have been a joint project between the US and Israeli governments. The malware is considered a game changer in the security community for its ability to physically sabotage systems in power plants.

It is currently unclear if the Farsnews report is accurate, though director of security strategy at FireEye Jason Steer said it is certainly plausible.

"Given that this has already happened with Stuxnet, it is certainly more than plausible to believe that Stuxnet 2.0 is also possible. One would be naive to assume it wouldn't happen again. With the change in relationship between Iran and the US, it is highly likely that Israel and Saudi Arabia united to try and negate the threat of nuclear bombs on their front door,” he said.

The original Stuxnet worm hijacked control of Siemens industrial control systems, then forced them to alter key processes to damage machinery. The malware has since managed to spread outside of Iran and has affected several other power plants, some close to Europe.

Steer told V3 that, given how successful the original Stuxnet was at spreading, the fallout of a more advanced variant could be devastating for power plants, but will be of little concern to most regular businesses.

“Stuxnet was pretty powerful at disrupting the SCADA environment it was introduced to and has since jumped and gone into the wild – where it has even appeared on the International Space Station and Russian power stations, that we are aware of. So we should expect Stuxnet 2.0 to have an impact of a similar nature,” he said.

“Most businesses don't run SCADA [supervisory control and data acquisition] systems so unless you run a refinery, oil pipeline or something similar, then they will be safe from these types of industrial-style attacks. Most businesses should be more worried about the cybercrime attacks that wash up via email and on web pages their employees surf to every day that will enable remote access capabilities to their network, like Zeus and Houdini, that are exfiltrating data out of their business.”

Security tycoon Eugene Kaspersky confirmed in November that at least one Russian Nuclear Plant has been very badly infected by Stuxnet. Security experts have since said it is only a matter of time before a Stuxnet infection is discovered in the UK.

Attacks on critical infrastructure areas, such as power, are a growing problem facing governments and businesses. Numerous other cyber attacks have been uncovered hitting companies involved in critical infrastructure areas, and many of these attacks are currently believed to stem from China.
Source:-
Governments preparing Stuxnet 2.0 malware for nuclear strike - IT News from V3.co.uk


As a programmer i am really worried about the current Pakistani research in the field of cyber crime. Countries like USA& Israel are always two steps ahead of us because of the time they put in research.We can be the next one and if we don,t take it seriously our nuclear installations and sensitive data centres can be next target.
 
Saudi Arabia :omghaha:
Yes i know that sound funny and i am also wondering how those sand niggers can develop a cyber warfare technology )) But my friend be careful Israel is helping them and you know these Saudi bastards are well known american and Israeli puppets.I have more respect and love for the irani people than the saudi arabians.We have too much common with irani people eg language,culture,race etc but other than a religion we have nothing in common with those saudis which they don,t care and relationships cannot solely be based on religion.No matter what happen iran will become a nuclear power.
Long live the beautiful irani people of Persia.
 
Yes i know that sound funny and i am also wondering how those sand niggers can develop a cyber warfare technology )) But my friend be careful Israel is helping them and you know these Saudi bastards are well known american and Israeli puppets.I have more respect and love for the irani people than the saudi arabians.We have too much common with irani people eg language,culture,race etc but other than a religion we have nothing in common with those saudis which they don,t care and relationships cannot solely be based on religion.No matter what happen iran will become a nuclear power.
Long live the beautiful irani people of Persia.

I know brother ...
 
today , Iran Defense minister unveiled some achievement in cyber defense ....

Routers ....
indigenous OS
Hard ware Fire walls ...
and other things ...
 
Oh shit bullshit Saudi barbariaaaaa wants to strike us!

IT is not like other sciences , even one genius in stone age country can hurt other countries... but I really don't know about Saudi and their engineers capability in IT ... so I can't say anything about them ....
 
IT is not like other sciences , even one genius in stone age country can hurt other countries... but I really don't know about Saudi and their engineers capability in IT ... so I can't say anything about them ....

Make sure the best science that they have is how to use a car
 
Good to say I am not hatred to Arabs.I think the worst anti muslim regime in world is Saudi.They condem why US let dictator Mubarak fail and at ther other side they do all they can to take down bashar asad.they do all they can against Muslim stability in region.Mubarak was close friend to zionists at other side Assad is fully against zionists.In Syria at least 60% of people wants Assad but in Egypt even 10% of people does not want Mubarak.We see here just satanism
 
IT is not like other sciences , even one genius in stone age country can hurt other countries... but I really don't know about Saudi and their engineers capability in IT ... so I can't say anything about them ....

I've read the stuxnet dossiers and technical analysis in some detail. It's not like another IT project. It required:
  1. a team of geniuses across various IT security fields
  2. access to the high value black markets where professional hacker groups trade high quality exploits - stuxnet had 4 high value exploits (called zero day exploits) - each of these cost around $200,000 in the black market
  3. at least USD 3 million of funding
  4. access to well-guarded secrets of Siemen's PLC
  5. a good amount of technical information about Iran's nuclear enrichment setup.
So esentially, stuxnet needs more than one genius in a stone age country

I've worked with CERT-SA indirectly. Their analysts are passionate and serious about cybersecurity, but simply don't have the technical know-how to pull anything like this off. They are heavily reliant on western vendors for solutions.

Here's a very comprehensive analysis of stuxnet in case you're interested:

http://www.wired.com/images_blogs/threatlevel/2011/02/Symantec-Stuxnet-Update-Feb-2011.pdf [PDF]
 
Saudi money, Israel name, U.S tech.
Yes it,s a deadly combination and that,s that i was telling him not to take it lightly.

I've read the stuxnet dossiers and technical analysis in some detail. It's not like another IT project. It required:
  1. a team of geniuses across various IT security fields
  2. access to the high value black markets where professional hacker groups trade high quality exploits - stuxnet had 4 high value exploits (called zero day exploits) - each of these cost around $200,000 in the black market
  3. at least USD 3 million of funding
  4. access to well-guarded secrets of Siemen's PLC
  5. a good amount of technical information about Iran's nuclear enrichment setup.
So esentially, stuxnet needs more than one genius in a stone age country

I've worked with CERT-SA indirectly. Their analysts are passionate and serious about cybersecurity, but simply don't have the technical know-how to pull anything like this off. They are heavily reliant on western vendors for solutions.

Here's a very comprehensive analysis of stuxnet in case you're interested:

http://www.wired.com/images_blogs/threatlevel/2011/02/Symantec-Stuxnet-Update-Feb-2011.pdf [PDF]
Yes stuxnet is a highly sophisticated malware and it,s not a job of some teenage hacker who created it in his basement.I am pretty sure it,s a big level game financed by Israel and USA.
That,s how it destroyed the centrifuges in the natanz nuclear facility of iran
The attacks seem designed to force a change in the centrifuge’s rotor speed, first raising the speed and then lowering it, likely with the intention of inducing excessive vibrations or distortions that would destroy the centrifuge. If its goal was to quickly destroy all the centrifuges in the FEP [Fuel Enrichment Plant], Stuxnet failed. But if the goal was to destroy a more limited number of centrifuges and set back Iran’s progress in operating the FEP, while making detection difficult, it may have succeeded, at least temporarily.
One more thing is that it also affected 1.28% computers in Pakistan and i hope it did not affect computers related to our missile and space program.
 
Last edited:
Back
Top Bottom