Stuxnet computer worm from USA and Israel – infected Russian nuclear plant
US-Israeli computer super-worm hit Russian nuclear plant – Kaspersky Rt.com : November 12, 2013 The CEO of one of the world’s foremost computer security firms says the Stuxnet worm that targeted Iranian nuclear facilities may have also infiltrated similar critical systems in Russia.
If accurate, allegations that Stuxnet snuck its way into Russia could implicate the United States and Israel in an even broader act of cyberwar than previously reported.
Since Stuxnet was discovered in 2010, the media has all but confirmed that the US and Israel collaborated on the computer worm to try and cripple machinery inside Iran’s nuclear power plants. Senior White House officials speaking to the New York Times have previously lent credence to that accusation, National Security Agency whistleblower Edward Snowden confirmed in a Der Spiegel interview earlier this year and the origin of the worm is nowadays hardly contested. Speaking in Australia last week, however, the head of the international IT firm, Kaspersky Lab, raised new questions regarding the actual scope of the secretive program.
Eugene Kaspersky was making a presentation at the National Press Club of Australia on the topic of cybersecurity when he warned of the serious ramifications that could be caused by unleashing viruses. ……
Eugene Kaspersky Press Club 2013
After Kaspersky’s remarks began to circulate like wildfire on the Web, his company issued a press release reiterating the size and scope of Stuxnet, based on what scientists have already managed to learn. “According to data from the Kaspersky Security Network, by the end of September 2010, more than 100,000 computer systems in approximately 30,000 organizations around the world were infected by Stuxnet,” the company confirmed.
As Kaspersky told the crowd in Australia, though, these computer worms — estimated to cost tens of millions of dollars to manufacture — are indeed quite capable of coming back and infecting entities it never intended to impact. “Everything you do is a boomerang. It will get back to you,” he said.
According to Kaspersky, companies need to take necessary steps to protect themselves from hackers, whom he estimates to be behind millions of attacks every day. And even if attacks against critical infrastructure components are limited, he cautioned that no target is was too large to be subject to a cyber-attack…… http://rt.com/usa/kaspersky-russia-nuclear-plants-612/
No comments yet.

Leave a comment