IMPACTFUL VIRUSES IN HISTORY: STUXNET
In the early 2000s, tensions in the middle east were on the rise. Iran’s government had begun expanding its uranium enrichment capabilities, insisting it was for nuclear energy purposes. However many countries around the globe feared it was a coverup for a nuclear weapons program. Despite pressure from United Nations and the International Atomic Energy Agency, Iran continued to enrich uranium. Frustrations reached a fever pitch and it appeared a conflict was imminent, until a mysterious solution came from a completely unexpected source: the Stuxnet Computer Worm.

Although its origin is a mystery, its target was Iran’s nuclear enrichment facilities, particularly the centrifuges at a particular plant called Natanz. Because the target computers were not connected to the internet, it is widely believed Stuxnet got in through USB sticks from either spies, insiders or social engineering – think a USB stick dropped in a parking lot and someone plugging it in out of curiosity. This happens more than you think!
Once the worm was installed it began its silent infection. Its function was to seek out a very specific software, Siemens Step7, on all the computers that controlled the centrifuges. Utilizing a new and undiscovered software flaw, it would quietly take over the Programmable Logic Controllers (PLCs), or the devices that tell machines what to, and change how the centrifuges spun. Sometimes it made them spin too fast, other times too slow, which damaged them over time. At the same time Stuxnet made sure the monitoring systems showed normal data so operators didn’t realize anything was wrong, even as they were being destroyed.
Stuxnet is widely regarded as one of the most sophisticated and consequential pieces of malware ever made. This marked one of the first major examples of a cyberweapon being used to cause physical damage, and it helped usher in a new era of cyber warfare.
Uncomplicate IT News Blog


