IT Security & Network Security News & Reviews: Stuxnet: Hunting for the Malware's Origins

 
 
By Brian Prince  |  Posted 2011-01-28 Email Print this article Print
 
 
 
 
 
 
 
 
The Stuxnet worm's origins have been a hot-button topic since it was first detected last summer, and it continues to be gnashed over, as evidenced by events in the past two weeks. There are reports this week that Russia's envoy to NATO has called for organization members to join Moscow in investigating who launched Stuxnet. Before that, there was a Jan. 15 article in The New York Times in which unnamed sources said Israel's Dimona complex in the Negev desert was a testing ground for the worm. Earlier this month, there were discussions at Black Hat DC about the worm's code, which Securicon security consultant Tom Parker noted during a presentation contained basic errors despite having elements of sophistication. Peeling back the layers of Stuxnet has been a long and winding road, an effort that is sure to continue. It's not hard to understand why the worm has captured so many people's attention. The prospect of malware being able to disrupt a nuclear facility set off the bells of cyber-security experts, politicians and the public alike. It was cited by U.S. lawmakers as a justification for legislation, and by others for better industry regulations. With questions still open, Stuxnet remains a mystery. Here, eWEEK takes a look at some of the recent revelations about the worm and its impact on cyber-security.
 
 
 

Stuxnet: Hunting for the Malware's Origins

by Brian Prince
Stuxnet: Hunting for the Malware's Origins
 
 
 
 
 
 
 
 
 
 
 

Submit a Comment

Loading Comments...
 
Manage your Newsletters: Login   Register My Newsletters























 
 
 
 
 
 
 
 
 
Rocket Fuel