Explore the latest news and trends  

Keep yourself up to date with one of the following options:

  • Explore more news around Spam/Phishing, Malware/Cyber-attacks and Antivirus
  • Receive news and special offers from SPAMfighter directly in you inbox.
  • Get free tips and tricks from our blog and improve your security when surfing the net.
  • Go

Stuxnet Could be Re-Engineered for Constructing Inexpensive Malware

According to Eugene Kaspersky who founded Kaspersky the IT security company, civilian hackers could re-engineer the Stuxnet virus much more inexpensively and use it for causing a great deal of further destruction. The virus, understandably, was originally the creation of the Israeli and U.S government agencies seeking to bring down the Iranian nuclear system, stated Techworld.com in news on March 29, 2011.

Moreover, Eugene elaborates that Stuxnet exploited certain program vulnerabilities that currently have patches to fix them. However, that doesn't imply that the malware won't be adapted for further use, he says.

Additionally according to the Kaspersky founder, there's little problem in cracking the code for finding out its method of operation, for pulling out the components as well as to design it afresh in another style. All this alarmingly indicates that a fresh age of cyber-sabotage and cyber-wars has started, he adds.

Furthermore, security investigators at Kaspersky Lab after gathering details from the virus realize that it's high-end malicious software. Remarking about this, the investigators state that for developing such malicious software, there is requirement of an enormous budget. Quite naturally, they aren't the ordinary criminals on the Web who can create this kind of malware. Techworld.com reported this on March 29, 2011.

Said Chief Stephan Lechner responsible for the Institute handling citizens' security and safeguard, the virus' code was so complicated that only government agencies could develop it. Nevertheless, unscrupulous businesses could replicate an edition that was less refined, he indicated with conviction. Uk.msn.com reported this on March 25, 2011.

Lechner, at present, thinks that only intelligence services have the ability for devising such an assault; however, he stated that if anybody desired designing it again in a less sophisticated version then the capability possibly rested with industrial players. Uk.msn.com reported this on March 25, 2011.

Of course that version wouldn't be same as the original one of Stuxnet although it could be nearly same and hence capable of inflicting destruction on any specific target without difficulty while such instances would likely be more frequent during the forthcoming period, Lechner added. Uk.msn.com reported this in news on March 25, 2011.

Related article: Stuxnet malware Signed With JMicron Certificate

ยป SPAMfighter News - 06-04-2011

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Exchange Anti Spam Filter
Go back to previous page
Next