Symantec Rediscovers Stuxnet in Fresh Version
Symantec, in its new report just published, talks about the old Stuxnet worm that was used for damaging Iran's nuclear scheme, as being re-discovered in a fresh version, revealing the advanced weapon tool's latest development traits.
As widely perceived, USA and Israel were responsible for the original Stuxnet although none of the countries has openly disclosed itself to be the malware's creator. Stuxnet first appeared in news when it was involved in an attack in 2007 on the uranium enrichment plant of Iran. However, according to Symantec's new report, researchers at the company had discovered an assortment of components they named Stuxnet 0.5 whose time-of-origin is 2005.
Technical Director Eric Chien of the Security Response Team of Symantec said that there wasn't quite fresh clue about the actual individuals who perpetrated the attack, nevertheless, those weren't merely a hackers syndicate as activists alternatively a single person with vengeance. Cnet.com published this dated February 26, 2013.
Further according to Researcher Vikram Thakur from Symantec Security Response, while the earlier Stuxnet speeded up the Iranian nuclear plant's (Natanz) centrifuges followed with slowing them down so there was an ultimate crashing of them, the work of Stuxnet 0.5 was for opening followed with shutting of the intake valves of the centrifuges so crude uranium gas' pressure could be modified after feeding it inside the centrifuges. Washingtonpost.com published this dated February 27, 2013.
Symantec says Stuxnet 0.5, which was created within the Flamer environment, was distributed through contaminated Universal Serial Bus drives. There aren't any Microsoft exploits in it, although it contains payload targeted on Siemens 417 PLCs (Programmable Logic Controllers), which didn't fully exist within the subsequent variants.
The company states it has currently discovered 4 Stuxnet 'variant' that sabotaged 1,000-or-so centrifuges that enriched uranium at Natanz, with the possibility of others yet-to-be uncovered.
Consequently, a few of the breaks were filled, stated Liam O'Murchu, Researcher at Symantec. Reuters.com published this dated February 26, 2013.
Finally, Thakur says re-engineering Stuxnet for utilizing on more targets can be hard. With an extremely high sophistication level there's need for enormous information about the target towards developing a cyber-weapon, he concludes.
Related article: Symantec Reports: Microsoft’s Vulnerability genesis of New Worm
» SPAMfighter News - 05-03-2013
We are happy to see you are reading our IT Security News.
We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!