If you wish to action:
Object being modified by the action
Then please send an email request to [email protected].
Stuxnet: The Insidious Cyberweapon Used Against Iran - 2009 marked the year when a completely new form of warfare confirmed its arrival on the world stage. Beginning in the summer of 2009, the first version of a computer worm that was later dubbed ‘Stuxnet’ began spreading through the information networks associated with the Iranian nuclear program. Stuxnet targeted the thousands of centrifuges at the Natanz nuclear facility in Iran, with these centrifuges spinning at rapid speeds in order to detach isotopes in uranium gas. It is estimated that one version of the Stuxnet attack destroyed 1,000 out of the 5,000 centrifuges Iran had in operation at the time.
Because the Natanz nuclear facility was air-gapped from the internet as a security protection, a difficulty for the attackers was finding a way to get the worm into the computer systems of Natanz. The precise details regarding how Stuxnet was delivered are still somewhat unknown, with two possible, potentially complimentary operations responsible. Firstly, the attackers may have relied on engineers and others who had physical access to the plant. It has been reported that an Iranian engineer recruited by Dutch intelligence on behalf of the CIA and the Mossad potentially planted Stuxnet into the nuclear facilities system. Secondly, the use of cyberattacks against companies believed to be connected to the nuclear facility may have introduced the worm into Natanz, as Stuxnet was primarily spread through infected USB sticks.
The Stuxnet cyberattack was part of a larger cyberwarfare program codenamed Operation Olympic Games, which stretched back to the George W. Bush administration. Although the creators of Stuxnet have not officially taken responsibility for its creation, it is widely believed to be the work of American and Israeli intelligence. The cyberoperation came to an end in the summer of 2010 however, when an error in the code – which arguably came from an modification added by Israeli agents - led to the worm spreading around the internet. The actual success of the Stuxnet operation is still somewhat debated. Yet from a historical perspective, Stuxnet stands out not because of its debated effectiveness, but because it was the first confirmed attack in the new realm of cyberwarfare.
SUPPORT Insight History on Patreon: https://www.patreon.com/user?u=21862421
Subscribe to Insight History on YouTube: https://bit.ly/2XuJ8Ik
Subscribe to Insight History on BitChute: https://bit.ly/2ScB8rg
Follow and Connect with Insight History on Social Media:
Visit and subscribe to https://insighthistory.com/ for all the latest articles and videos from Insight History….
Chen, T. (2014). (Rep.). Strategic Studies Institute, US Army War College. https://bit.ly/2veRE1d
Jabbour, K., & Devendorf, E. (2017). Cyber Threat Characterization. The Cyber Defense Review, 2(3), 79-94. https://bit.ly/3c68cJ8
Reuters (16 May, 2019) Iran builds firewall against Stuxnet computer virus: minister https://www.reuters.com/article/us-iran-israel-stuxnet/iran-builds-firewall-against-stuxnet-computer-virus-minister-idUSKCN1SM116
Sanger, D. (June 1, 2012) Obama Order Sped Up Wave of Cyberattacks Against Iran, New York Times - https://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all&_r=0
Winer, S. (3 Sep. 2019) ‘Dutch mole’ planted Stuxnet virus in Iran nuclear site on behalf of CIA, Mossad, The Times of Israel, Yahoo https://www.timesofisrael.com/dutch-mole-planted-infamous-stuxnet-virus-in-iran-nuclear-site-report/
Zetter, K. (11 July, 2011) How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History, Wired - https://www.wired.com/2011/07/how-digital-detectives-deciphered-stuxnet/
Zetter, K. (03 Nov. 2014) An Unprecedented Look at Stuxnet, the World's First Digital Weapon, Wired https://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/
Creative Commons Imagery - all the rest from https://pixabay.com/ :
The Opte Project https://bit.ly/2TYoSdC Creative Commons Attribution 2.5 Generic license https://creativecommons.org/licenses/by/2.5/deed.en
Hamed Saber https://bit.ly/2vWtTv2 Creative Commons Attribution 2.0 Generic license https://bit.ly/33eJWAD
Hmbr at Hebrew Wikipedia https://bit.ly/2W0hiBQ GNU Free Documentation License, Version 1.2 or any later version https://bit.ly/2TTlTmC Creative Commons Attribution 2.5 Generic license https://bit.ly/2IGGUvM Creative Commons Attribution-Share Alike 3.0 Unported https://bit.ly/39JgTI2
Yagasi, translation of the original work by Sémhur https://bit.ly/2IFteRC Creative Commons Attribution-Share Alike 4.0 International license https://bit.ly/3aNThCg
U.S. Navy Navy Cyber: The 5th Operational Domain - https://bit.ly/38K2SZ6