Explore the latest news and trends  

Keep yourself up to date with one of the following options:

  • Explore more news around Spam/Phishing, Malware/Cyber-attacks and Antivirus
  • Receive news and special offers from SPAMfighter directly in your inbox.
  • Get free tips and tricks from our blog and improve your security when surfing the net.
Go
-->

Binary Agent Plants Stuxnet with USB

The Stuxnet PC-worm utilized for damaging the nuclear program of Iran was installed on the country's systems when one binary agent on behalf of Israel executed the installation. The agent reportedly utilized one memory stick that was booby-trapped for contaminating systems deployed at the core of the Natanz plant of nuclear reactors, revealed a recently published report. Arstechnica.com published this on April 13, 2012.

Understandably, upon contaminating, Stuxnet through the detachable device managed in getting inside the Natanz computers as an end-user merely activated an icon within Windows, reported Industrial Safety and Security Source (ISSSource). The institution referred to erstwhile and existing officials of the US intelligence whose anonymity was requested since they assisted in the investigation process. Stealthy forces belonging to USA and Israel wished for utilizing a saboteur so it could disseminate the infection and make sure the Stuxnet went deep inside the most impaired computers of the network, Richard Sale said while reporting. Arstechnica.com published this.

Moreover, according to Sale, officials of the intelligence department perceived that the agent had a connection with MEK (Mujahedeen-e-Khalq) that comprised Iranian dissidents having a distasteful and bloody past and who allegedly engaged in exterminating nuclear scientists of Iran because Mossad the Israeli Intelligence wanted thus.

Erstwhile/existing officers from USA in a statement to ISSSource named MEK as the attacks' perpetrator, with one officer saying that the blast was conducted with manipulated computers.

Further, a one-time US intelligence official stated that considering the intensity with which the nuclear program of Iran got affected, it was clear that only human effort was involved in propagating the worm, published isssource.com dated April 11, 2012.

In the meantime, aside affecting companies facilitating control of industrial computers, globally especially within Iran as well as India, the Stuxnet affected USA's energy industry too, stated Manager of Operations Liam O'Murchu for Symantec Security Response. CNET published this on April 12, 2012.

O'Murchu further stated that the development following the Stuxnet infection was pretty serious within the threat scenario, adding that it was basically enabling the attacker to acquire hold over the computer within any industrial control surrounding.

Related article: Banner Ads Holding malware Swamp Social Networking Sites

ยป SPAMfighter News - 21-04-2012

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Exchange Anti Spam Filter
Go back to previous page
Next