Symantec discovers 2005 US computer virus attack on Iran nuclear plants
Source: Guardian
Researchers at the security company Symantec have discovered an early version of the "Stuxnet" computer virus that was used to attack nuclear reprocessing plants in Iran, in what they say is a "missing link" dating back to 2005.
The discovery means that the US and Israel, who are believed to have jointly developed the software in order to carry out an almost undetectable attack on Iran's nuclear bomb-making ambitions, were working on the scheme long before it came to public notice and that development of Stuxnet, and its forerunner, began under the presidency of George W Bush, rather than being a scheme hatched during Barack Obama's first term.
The older version of the virus, dubbed "Stuxnet 0.5" to distinguish it from the "1.0" version also targeted control systems in Iran's Natanz enrichment facility, the researchers said.
"Stuxnet 0.5 was submitted to a malware scanning service in November 2007 and could have begun operation as early as November 2005," Symantec notes in a report. It may have been submitted to see whether Symantec's defences would recognise it as malware in which case it would have been useless. One key to Stuxnet's success was that it was not detected by conventional antivirus systems used in corporate and state computer systems.
Read more: http://www.guardian.co.uk/technology/2013/feb/26/symantec-us-computer-virus-iran-nuclear
Blue_Tires
(55,445 posts)Don't even want to guess how much this stunt costs...
Is this part true?? Was Israel really about to drag us into WWIII?
The success of Stuxnet in both forms is reckoned to have averted a planned military strike by Israel against Iran's reprocessing efforts in 2011. During 2010 it had seemed increasingly likely that Israeli jets might target the heavily-armoured plant to thwart Iran's nuclear ambitions.
But the computer virus, one of the most visible forms of a cyberwar that is increasingly raging between nation states, made that unnecessary, and is reckoned to have put Iran's plans back by years.
Kelvin Mace
(17,469 posts)who are believed to have jointly developed the software in order to carry out an almost undetectable attack on Iran's nuclear bomb-making ambitions
Not very successful with the "undetectable" part.
It's all fun and games until some country pull a similar stunt on a U.S. refinery, power grid, or dam. Then we'll be pissed and scream and invade.