Binary Agent Plants Stuxnet with USB
The Stuxnet PC-worm utilized for damaging the nuclear program of Iran was installed on the country's systems when one binary agent on behalf of Israel executed the installation. The agent reportedly utilized one memory stick that was booby-trapped for contaminating systems deployed at the core of the Natanz plant of nuclear reactors, revealed a recently published report. Arstechnica.com published this on April 13, 2012.
Understandably, upon contaminating, Stuxnet through the detachable device managed in getting inside the Natanz computers as an end-user merely activated an icon within Windows, reported Industrial Safety and Security Source (ISSSource). The institution referred to erstwhile and existing officials of the US intelligence whose anonymity was requested since they assisted in the investigation process. Stealthy forces belonging to USA and Israel wished for utilizing a saboteur so it could disseminate the infection and make sure the Stuxnet went deep inside the most impaired computers of the network, Richard Sale said while reporting. Arstechnica.com published this.
Moreover, according to Sale, officials of the intelligence department perceived that the agent had a connection with MEK (Mujahedeen-e-Khalq) that comprised Iranian dissidents having a distasteful and bloody past and who allegedly engaged in exterminating nuclear scientists of Iran because Mossad the Israeli Intelligence wanted thus.
Erstwhile/existing officers from USA in a statement to ISSSource named MEK as the attacks' perpetrator, with one officer saying that the blast was conducted with manipulated computers.
Further, a one-time US intelligence official stated that considering the intensity with which the nuclear program of Iran got affected, it was clear that only human effort was involved in propagating the worm, published isssource.com dated April 11, 2012.
In the meantime, aside affecting companies facilitating control of industrial computers, globally especially within Iran as well as India, the Stuxnet affected USA's energy industry too, stated Manager of Operations Liam O'Murchu for Symantec Security Response. CNET published this on April 12, 2012.
O'Murchu further stated that the development following the Stuxnet infection was pretty serious within the threat scenario, adding that it was basically enabling the attacker to acquire hold over the computer within any industrial control surrounding.
» SPAMfighter News - 21-04-2012
We are happy to see you are reading our IT Security News.
We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!