New and important evidence found in the sophisticated “Stuxnet” malware targeting industrial control systems provides strong hints that the code was designed to sabotage nuclear plants, and that it employs a subtle sabotage strategy that involves briefly speeding up and slowing down physical machinery at a plant over a span of weeks.More info at Wired.
“It indicates that [Stuxnet's creators] wanted to get on the system and not be discovered and stay there for a long time and change the process subtly, but not break it,” says Liam O Murchu, researcher with Symantec Security Response, which published the new information in an updated paper (.pdf) on Friday.
Stuxnet virus engineered for subtle nuclear sabotage?
Posted on Wednesday, November 17 2010 @ 0:00 CET by Thomas De Maesschalck
Security experts have found strong evidence that the Stuxnet malware was designed to cause subtle damage to nuclear plants: