IT Security & Network Security News & Reviews: Stuxnet: Hunting for the Malware's Origins
The Stuxnet worm's origins have been a hot-button topic since it was first detected last summer, and it continues to be gnashed over, as evidenced by events in the past two weeks. There are reports this week that Russia's envoy to NATO has called for organization members to join Moscow in investigating who launched Stuxnet. Before that, there was a Jan. 15 article in The New York Times in which unnamed sources said Israel's Dimona complex in the Negev desert was a testing ground for the worm. Earlier this month, there were discussions at Black Hat DC about the worm's code, which Securicon security consultant Tom Parker noted during a presentation contained basic errors despite having elements of sophistication. Peeling back the layers of Stuxnet has been a long and winding road, an effort that is sure to continue. It's not hard to understand why the worm has captured so many people's attention. The prospect of malware being able to disrupt a nuclear facility set off the bells of cyber-security experts, politicians and the public alike. It was cited by U.S. lawmakers as a justification for legislation, and by others for better industry regulations. With questions still open, Stuxnet remains a mystery. Here, eWEEK takes a look at some of the recent revelations about the worm and its impact on cyber-security.