You have commented 339 times on Rantburg.

Your Name
Your e-mail (optional)
Website (optional)
My Original Nic        Pic-a-Nic        Sorry. Comments have been closed on this article.
Bold Italic Underline Strike Bullet Blockquote Small Big Link Squish Foto Photo
Syria-Lebanon-Iran
Nuclear plant computers not hit by worm: Iran
2010-09-27
[Pak Daily Times] The malicious Stuxnet computer worm has hit 30,000 industrial computers in Iran, officials said on Sunday, but denied the Islamic republic's first nuclear plant at Bushehr was among those infected.
It wasn't 'Made with a Mac', so ...
So far, Stuxnet has infected about 30,000 IP addresses in Iran, Mahmoud Liayi, head of the information technology council at the ministry of industries, was quoted as saying by the government-run newspaper Iran Daily. Stuxnet, which was publicly identified in June, was tailored for Siemens supervisory control and data acquisition, or SCADA, systems commonly used to manage water supplies, oil rigs, power plants and other industrial facilities.

The worm is able to recognise a specific facility's control network and then destroy it, according to German computer security researcher Ralph Langner, who has been analysing the malicious software.
Shoulda used Ubuntu, guys ...
Langner suspected Stuxnet was targeting Bushehr nuclear power plant, where unspecified problems have been blamed for delays in getting the facility fully operational. Siemens said its software has not been installed at the plant, and an Iranian official denied the malware may have infected nuclear facilities.
This is what happens when you ignore that little balloon at the bottom-right that tells you that you don't have any anti-virus software installed ...
"This virus has not caused any damage to the main systems of the Bushehr power plant," Bushehr project manager Mahmoud Jafari said on Iran's Arabic-language Al-Alam television network.
I thought you said there wasn't one ...
"All computer programmes in the plant are working normally and have not crashed due to Stuxnet," said Jafari, adding there was no problem with the plant's fuel loading process.
As I understand it (which of course is not very well) nobody knows exactly what Stuxnet is supposed to do. I keep reading that all the hacker experts have figured out is that it establishes itself in the computers of factory-type systems and, perhaps, sends information out to somewhere, and, perhaps at some point will take over the computer and have it make its machine go damagingly faster or slower... perhaps. So not crashing isn't anything to crow about in this context.
The official IRNA news agency meanwhile quoted him as saying that some "personal computers of the plant's personnel" were infected by the worm.
Oh, really? Fascinating. Do tell us more.
And he told Fars news agency that so far, five versions of the malware had been detected in the country. The self-replicating worm has been found lurking on Siemens systems mostly in India, Indonesia, Pakistain, but the heaviest infiltration appears to be in Iran, according to software security researchers.

Telecommunications minister Reza Taqipour said "the worm has not been able to penetrate or cause serious damage to government systems."

"No serious damage to industrial systems (by Stuxnet) have been reported in the country," he said. According to Iran Daily, telecommunications official Saeed Mahdiyoun said "teams of experts had begun to systematically eliminate the virus."

Meanwhile Liayi said without giving details that Stuxnet was "likely a (foreign) government project," given its complexity. The newspaper cited various experts who suggested the United States and Israel were behind the malware, evoking the "West's electronic warfare against Iran."

Liayi said industries were currently receiving systems to combat Stuxnet, while stressing Iran had decided not to use anti-virus software developed by Siemens because "they could be carrying a new version of the malware."

"When Stuxnet is activated, the industrial automation systems start transmitting data about production lines to a main designated destination by the virus," Liayi said.

"There, the data is processed by the worm's architects and then engineer plots to attack the country." Iran's nuclear ambitions are at the heart of a conflict between Tehran and the West, which suspects the Islamic republic is seeking to develop atomic weapons under the cover of a civilian drive.
Posted by:Fred

#2  DAILY TIMES.PK > [Global] IMPLICATIONS OF "STUXNET" [CP Worm] IRAN CYBER-ATTACK. Not good for US-World Govts as per implications for damage to cyber-control of national infrastructure.

ARTIC > STUXNET WORM = may had been implanted by a MAJOR WORLD INTEL-GOVT AGENCY, or by ROGUE PERSONAGE(S) = EX-OPERATIVE(S) TRAINED BY SAME???
Posted by: JosephMendiola   2010-09-27 22:52  

#1  The official IRNA news agency meanwhile quoted him as saying that some "personal computers of the plant's personnel" were infected by the worm.

I'm thinking..."goat porn" as an entry point.
Posted by: tu3031   2010-09-27 20:19  

00:00