Topzle Topzle

Stuxnet

Updated: 12/11/2025, 9:25:36 AM Wikipedia source

Stuxnet is a malicious computer worm first uncovered on 17 June 2010 and thought to have been in development since at least 2005. Stuxnet targets supervisory control and data acquisition (SCADA) systems and is believed to be responsible for causing substantial damage to the Iran nuclear program after it was first installed on a computer at the Natanz Nuclear Facility in 2009. Although neither the United States nor Israel has openly admitted responsibility, multiple independent news organizations claim Stuxnet to be a cyberweapon built jointly by the two countries in a collaborative effort known as Operation Olympic Games. The program, started during the Bush administration, was rapidly expanded within the first months of Barack Obama's presidency. Stuxnet specifically targets programmable logic controllers (PLCs), which allow the automation of electromechanical processes such as those used to control machinery and industrial processes including gas centrifuges for separating nuclear material. Exploiting four zero-day flaws in the systems, Stuxnet functions by targeting machines using the Microsoft Windows operating system and networks, then seeking out Siemens Step7 software. Stuxnet reportedly compromised Iranian PLCs, collecting information on industrial systems and causing the fast-spinning centrifuges to tear themselves apart. Stuxnet's design and architecture are not domain-specific and it could be tailored as a platform for attacking modern SCADA and PLC systems (e.g., in factory assembly lines or power plants), most of which are in Europe, Japan and the United States. Stuxnet reportedly destroyed almost one-fifth of Iran's nuclear centrifuges. Targeting industrial control systems, the worm infected over 200,000 computers and caused 1,000 machines to physically degrade. Stuxnet has three modules: a worm that executes all routines related to the main payload of the attack, a link file that automatically executes the propagated copies of the worm and a rootkit component responsible for hiding all malicious files and processes to prevent detection of Stuxnet. It is typically introduced to the target environment via an infected USB flash drive, thus crossing any air gap. The worm then propagates across the network, scanning for Siemens Step7 software on computers controlling a PLC. In the absence of either criterion, Stuxnet becomes dormant inside the computer. If both the conditions are fulfilled, Stuxnet introduces the infected rootkit onto the PLC and Step7 software, modifying the code and giving unexpected commands to the PLC while returning a loop of normal operation system values back to the users.

Infobox

Technical name
As Stuxnet By Microsoft Worm:Win32/Stuxnet.[Letter] TrojanDropper:Win32/Stuxnet By Symantec W32.Stuxnet W32.Stuxnet!lnk By Sophos Troj/Stuxnet-[Letter] Trojan-Dropper.Win32.Stuxnet.[Letter] Worm.Win32.Stuxnet.[Letter] TR/Drop.Stuxnet.[Letter].[Number] By Kaspersky Worm.Win32.Stuxnet By F-Secure Trojan-Dropper:W32/Stuxnet Rootkit:W32/Stuxnet By Trend Micro RTKT_STUXNET.[Letter] LNK_STUXNET.[Letter] WORM_STUXNET.[Letter]
Type
Dropper
Classification
Computer worm
Authors
Equation Group
Platform
mw- Windows 2000Windows XPWindows Server 2003Windows VistaWindows Server 2008Windows 7Windows Server 2008 R2Source:

Tables

· Affected countries
Iran
Iran
Country
Iran
Share of infected computers
58.9%
Indonesia
Indonesia
Country
Indonesia
Share of infected computers
18.2%
India
India
Country
India
Share of infected computers
8.3%
Azerbaijan
Azerbaijan
Country
Azerbaijan
Share of infected computers
2.6%
United States
United States
Country
United States
Share of infected computers
1.6%
Pakistan
Pakistan
Country
Pakistan
Share of infected computers
1.3%
Other countries
Other countries
Country
Other countries
Share of infected computers
9.2%
Country
Share of infected computers
Iran
58.9%
Indonesia
18.2%
India
8.3%
Azerbaijan
2.6%
United States
1.6%
Pakistan
1.3%
Other countries
9.2%

References

  1. "W32.Stuxnet Dossier"
    https://web.archive.org/web/20191104195500/https://www.wired.com/images_blogs/threatlevel/2010/11/w32_stuxnet_dossier.pdf
  2. CERT-IST Computer Emergency Response Team
    https://www.cert-ist.com/public/en/SO_detail?code=stuxnet
  3. IEEE Spectrum
    https://ui.adsabs.harvard.edu/abs/2013IEEES..50c..48K
  4. Atlantic Council
    https://www.atlanticcouncil.org/blogs/new-atlanticist/iran-s-growing-cyber-capabilities-in-a-post-stuxnet-era/
  5. Ars Technica
    https://arstechnica.com/tech-policy/2012/06/confirmed-us-israel-created-stuxnet-lost-control-of-it/
  6. The Washington Post
    https://www.washingtonpost.com/world/national-security/stuxnet-was-work-of-us-and-israeli-experts-officials-say/2012/06/01/gJQAlnEy6U_story.html
  7. The New York Times Magazine
    https://www.nytimes.com/2019/09/04/magazine/iran-strike-israel-america.html
  8. The New York Times
    https://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html
  9. ZDNet
    https://web.archive.org/web/20141125225130/http://www.zdnet.com/blog/security/stuxnet-attackers-used-4-windows-zero-day-exploits/7347
  10. IECON 2011 – 37th Annual Conference of the IEEE Industrial Electronics Society
    https://papers.duckdns.org/files/2011_IECON_stuxnet.pdf
  11. Business Insider
    http://www.businessinsider.com/stuxnet-was-far-more-dangerous-than-previous-thought-2013-11
  12. www.mac-solutions.net
    https://web.archive.org/web/20170904015230/https://www.mac-solutions.net/en/news/129-sheep-dip-your-removable-storage-devices-to-reduce-the-threat-of-cyber-attacks
  13. "STUXNET Malware Targets SCADA Systems"
    http://about-threats.trendmicro.com/us/webattack/54/STUXNET%20Malware%20Targets%20SCADA%20Systems
  14. Vanity Fair
    https://www.vanityfair.com/news/2011/03/stuxnet-201104
  15. "Exploring Stuxnet's PLC Infection Process"
    https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey=ad4b3d10-b808-414c-b4c3-ae4a2ed85560&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=librarydocuments
  16. Totally Integrated Automation
    https://web.archive.org/web/20210421092726/https://www.totallyintegratedautomation.com/2010/09/building-a-cyber-secure-plant/
  17. Computerworld
    http://www.computerworld.com/article/2515570/network-security/siemens--stuxnet-worm-hit-industrial-systems.html
  18. "Last-minute paper: An indepth look into Stuxnet"
    https://web.archive.org/web/20211209121553/https://www.virusbulletin.com/conference/vb2010/abstracts/indepth-look-stuxnet
  19. BBC News
    https://web.archive.org/web/20170716012344/http://www.bbc.co.uk/news/world-middle-east-11414483
  20. "Stuxnet Introduces the First Known Rootkit for Industrial Control Systems"
    https://archive.today/20120911051845/http://www.symantec.com/connect/blogs/stuxnet-introduces-first-known-rootkit-scada-devices
  21. "Iran's Nuclear Agency Trying to Stop Computer Worm"
    https://archive.today/20100925234352/http://www.nytimes.com/aponline/2010/09/25/world/middleeast/AP-ML-Iran-Cyber-Attacks.html?_r=1
  22. InfoWorld
    http://www.infoworld.com/article/2626009/malware/is-stuxnet-the--best--malware-ever-.html
  23. IEEE Spectrum
    https://web.archive.org/web/20210414155345/https://spectrum.ieee.org/podcast/telecom/security/how-stuxnet-is-rewriting-the-cyberterrorism-playbook
  24. BBC News
    https://www.bbc.co.uk/news/technology-12465688
  25. BBC News
    https://www.bbc.co.uk/news/technology-11388018
  26. The Daily Telegraph
    https://www.telegraph.co.uk/technology/news/8021102/Stuxnet-virus-worm-could-be-aimed-at-high-profile-Iranian-targets.html
  27. Reuters
    https://www.reuters.com/article/idUSLDE68N1OI20100924
  28. CBS News
    https://www.cbsnews.com/news/iran-confirms-stuxnet-worm-halted-centrifuges/
  29. The New York Times
    https://www.nytimes.com/2010/09/30/world/middleeast/30worm.html?_r=2&pagewanted=2&hpw
  30. "Software smart bomb fired at Iranian nuclear plant: Experts"
    http://economictimes.indiatimes.com/news/news-by-industry/et-cetera/Software-smart-bomb-fired-at-Iranian-nuclear-plant-Experts/articleshow/6617686.cms
  31. Kaspersky
    http://www.kaspersky.com/about/news/virus/2010/Kaspersky_Lab_provides_its_insights_on_Stuxnet_worm
  32. F-Secure
    https://web.archive.org/web/20210505195313/https://archive.f-secure.com/weblog/archives/00002040.html
  33. Gary Samore Archived 27 April 2018 at the Wayback Machine speaking at the 10 December 2010 Washington Forum of the Found
    https://www.pbs.org/wnet/need-to-know/security/video-cracking-the-code-defending-against-the-superweapons-of-the-21st-century-cyberwar/9456/
  34. "Israel video shows Stuxnet as one of its successes"
    https://www.telegraph.co.uk/news/worldnews/middleeast/israel/8326387/Israel-video-shows-Stuxnet-as-one-of-its-successes.html
  35. The New York Times
    https://web.archive.org/web/20170225103053/https://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html
  36. CNET
    https://news.cnet.com/8301-17852_3-57478515-71/thunderstruck-a-tale-of-malware-ac-dc-and-irans-nukes/
  37. BBC News
    https://web.archive.org/web/20160807095642/https://www.bbc.com/news/world-middle-east-20842113
  38. The Times of Israel
    https://web.archive.org/web/20170920120029/http://www.timesofisrael.com/stuxnet-gone-rogue-hit-russian-nuke-plant-space-station/
  39. Krebs on Security
    http://krebsonsecurity.com/2010/07/experts-warn-of-new-windows-shortcut-flaw/
  40. Vanity Fair
    https://www.vanityfair.com/news/2011/03/stuxnet-201104
  41. wilderssecurity.com
    http://www.wilderssecurity.com/showthread.php?p=1712134#post1712134
  42. Symantec
    https://web.archive.org/web/20120104215049/http://www.symantec.com/security_response/writeup.jsp?docid=2010-071400-3123-99
  43. arstechnica.com
    https://arstechnica.com/tech-policy/2011/07/how-digital-detectives-deciphered-stuxnet-the-most-menacing-malware-in-history/
  44. abc.net.au
    http://www.abc.net.au/science/articles/2011/10/26/3348123.htm
  45. "Myrtus and Guava: the epidemic, the trends, the numbers"
    https://web.archive.org/web/20110101113112/http://www.securelist.com/en/blog/325/Myrtus_and_Guava_the_epidemic_the_trends_the_numbers
  46. Reuters
    https://www.reuters.com/article/us-cyberwar-stuxnet-idUSBRE91P0PP20130226
  47. "Stuxnet Under the Microscope, Revision 1.31"
    https://web.archive.org/web/20220122123326/https://www.welivesecurity.com/wp-content/uploads/2012/11/Stuxnet_Under_the_Microscope.pdf
  48. "Super Virus A Target For Cyber Terrorists"
    http://news.sky.com/skynews/Home/World-News/Stuxnet-Worm-Virus-Targeted-At-Irans-Nuclear-Plant-Is-In-Hands-Of-Bad-Guys-Sky-News-Sources-Say/Article/201011415827544
  49. Kaspersky Lab
    https://securelist.com/a-fanny-equation-i-am-your-father-stuxnet/68787/
  50. GitHub
    https://github.com/loneicewolf/fanny.bmp/
  51. securelist.com
    https://web.archive.org/web/20150217023145/https://securelist.com/files/2015/02/Equation_group_questions_and_answers.pdf
  52. threatpost.com
    https://threatpost.com/stuxnet-apts-gossip-girl/143595/
  53. Medium
    https://medium.com/chronicle-blog/who-is-gossipgirl-3b4170f846c0
  54. Electrospaces
    https://web.archive.org/web/20150323101629/https://s3.amazonaws.com/s3.documentcloud.org/documents/1690221/doc-4-csec-sigint-discocon-2010.pdf
  55. "Territorial Dispute – NSA's perspective on APT landscape"
    https://web.archive.org/web/20220110210924/https://www.crysys.hu/publications/files/tedi/ukatemicrysys_territorialdispute.pdf
  56. YouTube
    https://www.youtube.com/watch?v=hVlMYXLB0m0
  57. "GOSSIPGIRL – Stuxnet group had '4th man;' unknown version of Flame & Duqu found"
    https://www.scmagazineuk.com/gossipgirl-stuxnet-group-4th-man-unknown-version-flame-duqu-found/article/1581579
  58. docs.microsoft.com
    https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-061
  59. docs.microsoft.com
    https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-067
  60. Facundo Muñoz Research
    https://web.archive.org/web/20200930073726/https://fmmresearch.wordpress.com/2020/09/28/the-emerald-connection-equationgroup-collaboration-with-stuxnet/
  61. "W32.Stuxnet"
    https://web.archive.org/web/20120104215049/http://www.symantec.com/security_response/writeup.jsp?docid=2010-071400-3123-99
  62. "Iran denies hacking into American banks Archived 24 September 2015 at the Wayback Machine" Reuters, 23 September 2012
    https://www.reuters.com/article/us-iran-cyberattacks-denial-idUSBRE88M06O20120923
  63. www.congress.gov
    https://www.congress.gov/crs_external_products/IF/HTML/IF11406.web.html
  64. EBSCO
    https://www.ebsco.com/
  65. www.cfr.org
    https://www.cfr.org/cyber-operations/compromise-saudi-aramco-and-rasgas
  66. darknetdiaries.com
    https://darknetdiaries.com/transcript/30/
  67. Reuters
    https://www.reuters.com/article/technology/las-vegas-sands-network-hit-by-destructive-malware-in-feb-bloomberg-idUSKBN0JQ045/
  68. The Hacker News
    https://thehackernews.com/2014/12/las-vegas-casino-hacked.html
  69. New York Times
    https://www.nytimes.com/2011/01/16/world/middleeast/16stuxnet.html?_r=1&ref=general&src=me&pagewanted=all
  70. IEEE Spectrum
    https://web.archive.org/web/20210414174152/https://spectrum.ieee.org/podcast/telecom/security/sons-of-stuxnet
  71. "Conficker Worm: Help Protect Windows from Conficker"
    https://technet.microsoft.com/en-us/security/dd452420.aspx
  72. "Creating Malware using the Stuxnet LNK Exploit"
    http://www.rubydevices.com.au/blog/stuxnetLnkExploit
  73. Wired
    https://www.wired.com/2010/09/stuxnet-2/
  74. "Stuxnet P2P component"
    https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey=12adb5c4-1b6b-41dc-95a5-e6320371a847&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=librarydocuments
  75. "W32.Stuxnet Dossier"
    https://web.archive.org/web/20120707184843/http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf
  76. "Microsoft Security Bulletin MS10-061 – Critical"
    https://technet.microsoft.com/en-us/library/security/ms10-061.aspx
  77. "Microsoft Security Bulletin MS10-046 – Critical"
    https://technet.microsoft.com/en-us/library/security/ms10-046.aspx
  78. "Myrtus and Guava, Episode MS10-061"
    https://securelist.com/blog/incidents/29747/myrtus-and-guava-episode-ms10-061/
  79. "Kaspersky Lab provides its insights on Stuxnet worm"
    http://www.kaspersky.com/about/news/virus/2010/Kaspersky_Lab_provides_its_insights_on_Stuxnet_worm
  80. Vanity Fair
    https://www.vanityfair.com/news/2011/03/stuxnet-201104
  81. Ot-Base by Langner
    http://www.langner.com/en/2010/09/14/ralphs-step-by-step-guide-to-get-a-crack-at-stuxnet-traffic-and-behavior/
  82. "Stuxnet Infection of Step 7 Projects"
    https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey=0c21cbc7-0c40-44e7-8539-8d682b80103c&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=librarydocuments
  83. "Vulnerability Summary for CVE-2010-2772"
    http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2772
  84. "Stuxnet: A Breakthrough"
    https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey=550505c5-c38a-4e0c-b590-f731bb3a60ad&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=librarydocuments
  85. "SIMATIC WinCC / SIMATIC PCS 7: Information concerning Malware / Virus / Trojan"
    https://support.industry.siemens.com/cs/document/43876783/simatic-wincc-simatic-pcs-7%3A-information-about-malware-viruses-trojan-horses?dti=0&lc=en-WW
  86. CNET
    https://www.cnet.com/news/privacy/siemens-warns-stuxnet-targets-of-password-risk/
  87. "Stuxnet also found at industrial plants in Germany"
    http://www.h-online.com/security/news/item/Stuxnet-also-found-at-industrial-plants-in-Germany-1081469.html
  88. "Repository of Industrial Security Incidents"
    http://www.securityincidents.org/
  89. "DHS National Cyber Security Division's CSSP"
    http://www.us-cert.gov/control_systems/
  90. "ISA99, Industrial Automation and Control System Security"
    https://web.archive.org/web/20110110194234/http://www.isa.org/MSTemplate.cfm?MicrositeID=988&CommitteeID=6821
  91. "Industrial communication networks – Network and system security – Part 2-1: Establishing an industrial automation and control system security program"
    http://www.iec.ch/cgi-bin/procgi.pl/www/iecwww.p?wwwlang=E&wwwprog=pro-det.p&He=IEC&Pu=62443&Pa=2&Se=1&Am=&Fr=&TR=&Ed=1
  92. "Chemical Sector Cyber Security Program"
    https://web.archive.org/web/20101019140808/http://americanchemistry.com/s_chemitc/sec_callout.asp?CID=1733&DID=6429
  93. "Pipeline SCADA Security Standard"
    http://www.api.org/meetings/topics/pipeline/upload/Pipeline_SCADA_Security_Standard.pdf
  94. 2008 Automation Summit: A User's Conference
    https://graphics8.nytimes.com/packages/pdf/science/NSTB.pdf
  95. "The Can of Worms Is Open-Now What?"
    http://www.controlglobal.com/articles/2010/StuxnetWorm1010.html
  96. "The 7 Steps to ICS Security"
    https://web.archive.org/web/20130123141949/http://www.exida.com/index.php/News/new_whitepaper_the_7_steps_to_ics_and_scada_security/
  97. The Guardian
    https://www.theguardian.com/technology/2010/sep/24/stuxnet-worm-national-agency
  98. The New York Times
    https://www.nytimes.com/2010/09/27/technology/27virus.html
  99. Forbes
    https://www.forbes.com/2010/10/06/iran-nuclear-computer-technology-security-stuxnet-worm.html
  100. "Another Piece of the Stuxnet Puzzle"
    http://www.schneier.com/blog/archives/2012/02/another_piece_o.html
  101. De Volksrant
    https://www.volkskrant.nl/kijkverder/v/2024/sabotage-in-iran-een-missie-in-duisternis~v989743/
  102. The Times and The Sunday Times
    https://www.thetimes.com/world/article/dutch-spies-hid-engineers-role-in-stalling-iran-nuclear-project-dtqh3s2hq
  103. Security Week
    https://www.securityweek.com/dutch-engineer-used-water-pump-to-get-billion-dollar-stuxnet-malware-into-iranian-nuclear-facility-report/
  104. Christian Science Monitor
    https://www.csmonitor.com/World/terrorism-security/2010/1001/Clues-emerge-about-genesis-of-Stuxnet-worm
  105. Ralph Langner: Cracking Stuxnet, a 21st-century cyber weapon
    https://web.archive.org/web/20140201101050/http://www.ted.com/talks/ralph_langner_cracking_stuxnet_a_21st_century_cyberweapon.html
  106. Computerworld
    http://www.computerworld.com/article/2519584/network-security/iran-was-prime-target-of-scada-worm.html
  107. "Iran confirms Stuxnet found at Bushehr nuclear power plant"
    http://warincontext.org/2010/09/26/iran-confirms-stuxnet-found-at-bushehr-nuclear-power-plant/
  108. "6 mysteries about Stuxnet"
    https://web.archive.org/web/20140209181744/http://blog.foreignpolicy.com/posts/2010/09/27/6_mysteries_about_stuxnet
  109. Christian Science Monitor
    https://www.csmonitor.com/USA/2010/0921/Stuxnet-malware-is-weapon-out-to-destroy-Iran-s-Bushehr-nuclear-plant
  110. Haaretz
    https://www.haaretz.com/print-edition/news/computer-virus-in-iran-actually-targeted-larger-nuclear-facility-1.316052
  111. "Iran pauses uranium enrichment at Natanz nuclear plant"
    https://www.haaretz.com/news/international/iran-pauses-uranium-enrichment-at-natanz-nuclear-plant-1.326276
  112. The Economist
    https://www.economist.com/blogs/babbage/2010/09/stuxnet_worm
  113. "Serious nuclear accident may lay behind Iranian nuke chief's mystery resignation"
    https://web.archive.org/web/20101230121529/http://mirror.wikileaks.info/wiki/Serious_nuclear_accident_may_lay_behind_Iranian_nuke_chief%27s_mystery_resignation/
  114. IAEA Report on Iran
    http://www.isisnucleariran.org/assets/pdf/ISIS_Analysis_IAEA_Report_16Nov2009.pdf
  115. "Did Stuxnet Take Out 1,000 Centrifuges at the Natanz Enrichment Plant?"
    http://isis-online.org/uploads/isis-reports/documents/stuxnet_FEP_22Dec2010.pdf
  116. Der Spiegel
    http://www.spiegel.de/netzwelt/netzpolitik/0,1518,736604,00.html
  117. Der Spiegel
    http://www.spiegel.de/international/world/0,1518,778912,00.html
  118. The Washington Post
    https://web.archive.org/web/20220124000904/https://www.washingtonpost.com/world/irans-natanz-nuclear-facility-recovered-quickly-from-stuxnet-cyber-attack/2011/02/15/ABUIkoQ_story.html
  119. "Stuxnet Malware and Natanz: Update of ISIS December 22, 2010 Report"
    http://isis-online.org/isis-reports/detail/stuxnet-malware-and-natanz-update-of-isis-december-22-2010-reportsupa-href1/8
  120. Gulf News
    https://web.archive.org/web/20101120230019/http://gulfnews.com/news/region/iran/signs-of-sabotage-in-tehran-s-nuclear-programme-1.658481
  121. Reuters
    https://www.reuters.com/article/idUSLV83872
  122. The Hindu
    http://www.thehindu.com/news/international/article797363.ece
  123. شبکه خبر :: راه های مقابله با ویروس"استاکس نت"
    https://web.archive.org/web/20130621130831/http://www.irinn.ir/Default.aspx?TabId=56&nid=193428
  124. "Stuxnet worm rampaging through Iran: IT official"
    https://web.archive.org/web/20100930235902/http://www.google.com/hostednews/afp/article/ALeqM5jnTuOwD-HMJB9A8JQUC_-E_o2IYw
  125. Los Angeles Times
    http://latimesblogs.latimes.com/babylonbeyond/2010/09/israel-questions-about-the-stuxnet-attack-on-iranian-computers.html
  126. The Washington Post
    https://www.washingtonpost.com/wp-dyn/content/article/2010/09/27/AR2010092706229.html
  127. Der Spiegel
    http://www.spiegel.de/netzwelt/gadgets/0,1518,731881,00.html
  128. The Christian Science Monitor
    https://www.csmonitor.com/USA/2010/1130/Stuxnet-Ahmadinejad-admits-cyberweapon-hit-Iran-nuclear-program
  129. Wired
    https://www.wired.com/threatlevel/2010/11/stuxnet-sabotage-centrifuges/
  130. "US Denies Role in Iranian Scientist's Death"
    https://www.foxnews.com/world/us-denies-role-in-iranian-scientists-death/
  131. "New FAS Report Demonstrates Iran Improved Enrichment in 2010"
    https://web.archive.org/web/20131215104145/http://www.fas.org/press/news/2011/issuebrief_iran.html
  132. Haaretz
    https://www.haaretz.com/news/international/report-iran-s-nuclear-capacity-unharmed-contrary-to-u-s-assessment-1.338522
  133. The Atlantic
    https://www.theatlantic.com/international/archive/2011/01/report-irans-nuclear-program-going-full-speed-ahead/70031/
  134. Reuters
    https://www.reuters.com/article/us-iran-usa-stuxnet-idUSTRE81D24Q20120214
  135. Guardian.co.uk
    https://www.theguardian.com/technology/2010/sep/30/stuxnet-worm-new-era-global-cyberwar
  136. The New York Times
    https://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?_r=2&pagewanted=2&seid=auto&smid=tw-nytimespolitics&pagewanted=all
  137. Foreign Policy
    https://web.archive.org/web/20140209181744/http://blog.foreignpolicy.com/posts/2010/09/27/6_mysteries_about_stuxnet
  138. "Falkenrath Says Stuxnet Virus May Have Origin in Israel: Video. Bloomberg Television"
    https://web.archive.org/web/20121204121558/http://finance.yahoo.com/video/marketnews-19148628/falkenrath-says-stuxnet-virus-may-have-origin-in-israel-video-22090127#video=22147179
  139. Reuters
    https://www.reuters.com/article/idUSTRE5BE30920091215
  140. "Cyber takes centre stage in Israel's war strategy"
    https://web.archive.org/web/20101001091330/http://www.alertnet.org/thenews/newsdesk/LDE68R0GB.htm
  141. "Stuxnet, the real face of cyber warfare"
    http://www.iloubnan.info/politics/actualite/id/52568/titre/Stuxnet,-the-real-face-of-Cyber-Warfare
  142. The New York Times
    https://www.nytimes.com/2010/11/19/world/middleeast/19stuxnet.html
  143. The Telegraph
    https://www.telegraph.co.uk/technology/news/8326274/Israeli-security-chief-celebrates-Stuxnet-cyber-attack.html
  144. The U.S. Cyber Consequences Unit
    http://www.usccu.us/
  145. The Economist
    https://www.economist.com/international/2010/09/30/a-worm-in-the-centrifuge
  146. The New York Times
    https://www.nytimes.com/2010/09/26/world/middleeast/26iran.html?_r=2&src=me
  147. "Iran/Critical National Infrastructure: Cyber Security Experts See The Hand of Israel's Signals Intelligence Service in The 'Stuxnet' Virus Which Has Infected Iranian Nuclear Facilities"
    https://web.archive.org/web/20101208204541/http://www.mideastsecurity.co.uk/?tag=stuxnet-myrtus-myrtle
  148. "Mysterious 'Myrtus' Biblical Reference Spotted in Stuxnet Code"
    https://web.archive.org/web/20111001142357/http://www.switched.com/2010/10/01/mysterious-myrtus-biblical-reference-spotted-in-stuxnet-code/
  149. "SCADA Systems Whitepaper"
    https://www.motorola.com/web/Business/Products/SCADA%20Products/_Documents/Static%20Files/SCADA_Sys_Wht_Ppr-2a_New.pdf
  150. PC Magazine
    https://www.pcmag.com/article2/0,2817,2370107,00.asp
  151. Wired
    https://www.wired.com/threatlevel/2010/10/stuxnet-deconstructed/
  152. "Stuxnet Worm a U.S. Cyber-Attack on Iran Nukes?"
    https://www.cbsnews.com/news/stuxnet-worm-a-us-cyber-attack-on-iran-nukes/
  153. Der Spiegel
    http://www.spiegel.de/international/world/interview-with-whistleblower-edward-snowden-on-global-spying-a-910006.html
  154. Business Insider
    https://www.businessinsider.com/obama-cyberattacks-us-israeli-against-iran-2012-6
  155. The Guardian
    https://www.theguardian.com/world/2011/jan/18/wikileaks-us-embassy-cable-iran-nuclear
  156. The New York Times
    https://www.nytimes.com/2009/01/11/washington/11iran.html?pagewanted=all&_r=0
  157. Wired
    https://www.wired.com/threatlevel/2011/02/cyberwar-issues-likely-to-be-addressed-only-after-a-catastrophe
  158. De Correspondent
    https://decorrespondent.nl/485/hoe-onderschept-de-nsa-ons-dataverkeer/31326229055-d9b3a5cf
  159. Stars and Stripes
    http://www.stripes.com/news/cone-of-silence-surrounds-u-s-cyberwarfare-1.158090
  160. "Computers as Weapons of War"
    https://web.archive.org/web/20111219174833/http://www.crows.org/images/stories/pdf/IOI/IO%20Journal_Vol2Iss2_0210.pdf
  161. "Stuxnet: Computer worm opens new era of warfare"
    https://web.archive.org/web/20131015171113/http://www.cbsnews.com/8301-18560_162-57390124/stuxnet-computer-worm-opens-new-era-of-warfare/
  162. CBS News staff
    https://www.cbsnews.com/news/iran-blames-us-israel-for-stuxnet-malware/
  163. Wired
    https://www.wired.com/2013/06/general-keith-alexander-cyberwar/all/
  164. Forbes
    https://blogs.forbes.com/firewall/2010/12/14/stuxnets-finnish-chinese-connection/
  165. Christian Science Monitor
    https://www.csmonitor.com/USA/2010/0924/Stuxnet-worm-mystery-What-s-the-cyber-weapon-after
  166. news.yahoo.com
    https://news.yahoo.com/revealed-how-a-secret-dutch-mole-aided-the-us-israeli-stuxnet-cyber-attack-on-iran-160026018.html
  167. Jerusalem Post
    https://www.jpost.com/Middle-East/Secret-Dutch-mole-aided-Stuxnet-attack-on-Irans-nuke-program-report-600430
  168. Die ZEIT
    http://www.zeit.de/2010/48/Computerwurm-Stuxnet
  169. The Guardian
    https://www.theguardian.com/uk/2011/may/30/military-cyberwar-offensive
  170. The Register
    https://www.theregister.co.uk/2013/07/08/snowden_us_israel_stuxnet/
  171. Reuters
    https://www.reuters.com/article/us-usa-northkorea-stuxnet-idUSKBN0OE2DM20150529
  172. "Iran says Israel launched Stuxnet 2.0 Cyber Attack"
    https://www.cybersecurity-insiders.com/iran-says-israel-launched-stuxnet-2-0-cyber-attack/
  173. Foreign Policy
    https://foreignpolicy.com/articles/2013/11/19/stuxnets_secret_twin_iran_nukes_cyber_attack
  174. "Duqu: A Stuxnet-like malware found in the wild, technical report"
    http://www.crysys.hu/publications/files/bencsathPBF11duqu.pdf
  175. "Statement on Duqu's initial analysis"
    https://web.archive.org/web/20121004111047/http://crysys.hu/in-the-press.html
  176. "W32.Duqu – The precursor to the next Stuxnet (Version 1.2)"
    https://web.archive.org/web/20191025145245/https://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_duqu_the_precursor_to_the_next_stuxnet.pdf
  177. Reuters
    https://www.reuters.com/article/us-cybersecurity-stuxnet-idUSTRE7BR1EV20111228
  178. Wired
    https://www.wired.com/threatlevel/2012/05/flame/
  179. "Resource 207: Kaspersky Lab Research Proves that Stuxnet and Flame Developers are Connected"
    http://www.kaspersky.com/about/news/virus/2012/Resource_207_Kaspersky_Lab_Research_Proves_that_Stuxnet_and_Flame_Developers_are_Connected
  180. The Economist
    https://www.economist.com/leaders/2010/09/30/the-meaning-of-stuxnet
  181. Wired
    https://www.wired.com/2011/07/how-digital-detectives-deciphered-stuxnet/
  182. Der Spiegel
    http://www.spiegel.de/international/world/mossad-s-miracle-weapon-stuxnet-virus-opens-new-era-of-cyber-war-a-778912.html
  183. "2011: The year of domestic cyber threat"
    http://www.aljazeera.com/indepth/opinion/2012/01/20121181245291117.html
  184. "Sality & Stuxnet – Not Such a Strange Coincidence"
    http://www.kaspersky.com/about/news/virus/2010/Sality_Stuxnet_Not_Such_a_Strange_Coincidence
  185. BuzzFeed
    https://www.buzzfeed.com/jamesball/us-hacked-into-irans-critical-civilian-infrastructure-for-ma
  186. The New York Times
    https://www.nytimes.com/2016/10/18/us/marine-general-james-cartwright-leak-fbi.html
  187. The New Yorker
    https://www.newyorker.com/news/news-desk/world-war-three-by-mistake
  188. Darknet Diaries – True stories from the dark side of the Internet
    https://darknetdiaries.com/episode/29/
  189. "Splinter Cell Blacklist – Mission 10 'American Fuel'"
    https://www.youtube.com/watch?v=o77cNhuoI4A
  190. The Verge
    https://www.theverge.com/tldr/2017/10/3/16412372/star-trek-discovery-cbs-windows-code-command-line
Image
Source:
Tip: Wheel or +/− to zoom, drag to pan, Esc to close.