Stuxnet was by a player via usb-stick distributed’

0
354

Stuxnet is by an Iranian infiltrator for Isra lwa l worked on a usb-stick distributed at the nuclear facility in Natanz, in Iran. That claims at least the site ISS Source on the basis of sources within the American security service.

Sabotage by a person at the workplace would be much more efficient than waiting until the virus reaches its goal through other ways of dissemination. Iranian double agents would therefore be in the facility itself the most vulnerable systems sorted out, claims to ISS Source. After the in the systems sticking out of the usb-stick would be simply a matter of clicking on the icon of it on the stick present virus to spread to begin with. It would be a zero-day vulnerability used.

The infiltrators would be a member of the Mujahedeen-e-Khalq, is the military branch of the dissidentengroepering National Council of Resistance of Iran. They would be trained in Israel. In October 2010, the Iranian intelligence minister know that several ‘nuclear spies’ have been arrested in connection with Stuxnet.

Overall, Stuxnet’s use of four at the time, had not previously familiar Windows leak. The virus also spread outside Iran, but the actual damage was only in the systems, used for the enrichment of uranium, the Iranian nuclear complex at Natanz done. There were vulnerabilities in the Simatic WinCC software from Siemens is used.

Stuxnet would have been developed by American and Israeli intelligence services. Already in the eighties, the U.S. would have had experience with the plants of viruses in the Russian military industrial systems and this practice should now also in China is to be applied. In the early nineties, would the CIA and the British secret service viruses in the beheernetwerk of the Iraqi regime have managed to smuggle in. The buildings of infected systems could, however, be bombarded for the actual viruses damage could accomplish.