was unusual in that it destroyed physical products.
0 version of Stuxnet
is reckoned to have infected Iranian computers after being copied onto USB sticks which were left in locations in India and Iran known to be used by Iranian nuclear scientists and their contacts.
The attacks can be traced back to 2009-10, when the Stuxnet
cyberworm targeted Iran's uranium enrichment capabilities.
also slipped by the Windows' defenses using the equivalent of a stolen passport.
Microsoft issued a patch for Stuxnet
in 2010, but a recent report
25, the Stuxnet
attackers "signed" an enhanced version of the malware using a stolen digital certificate, Zetter writes.
He further said that malicious code such as Stuxnet
does not respect national boundaries and the cyber-attack code developed by South Korea could rebound and end up damaging South Korean infrastructure that uses the same technologies, the report added.
The paper also confirmed that the Stuxnet
virus was created with the help of a secret Israeli intelligence unit.
made international headlines in 2010 when it wrought havoc on equipment at Iran's Natanz nuclear plant and complicated the manufacture of highly enriched uranium, which the West suspects is intended for making atomic weapons.
This paper examines the time line of the Stuxnet
worm/virus, and the speed with which it infected computers across the globe.
Researchers from Symantec have found and analysed a version of the Stuxnet
cyber sabotage malware that predates previously discovered versions by at least two years.
Researchers at Symantec Corporation have uncovered a version of the Stuxnet
computer virus that was used to attack Iran's nuclear programme in November 2007, two years earlier than previously thought.