%s1 / %s2
 
NEDERLANDS  |  ENGLISH
  • economy
  • iran
  • e-voting
  • 9/11
  • media
  • top stories
  • read
  • news archive
  • by deepjournal
11 July 2011  |     mail this article   |     print   |    |  Wired
How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History

By Kim Zetter

It was January 2010, and investigators with the International Atomic Energy Agency had just completed an inspection at the uranium enrichment plant outside Natanz in central Iran, when they realized that something was off within the cascade rooms where thousands of centrifuges were enriching uranium.

Natanz technicians in white lab coats, gloves and blue booties were scurrying in and out of the “clean” cascade rooms, hauling out unwieldy centrifuges one by one, each sheathed in shiny silver cylindrical casings.

Any time workers at the plant decommissioned damaged or otherwise unusable centrifuges, they were required to line them up for IAEA inspection to verify that no radioactive material was being smuggled out in the devices before they were removed. The technicians had been doing so now for more than a month.

Normally Iran replaced up to 10 percent of its centrifuges a year, due to material defects and other issues. With about 8,700 centrifuges installed at Natanz at the time, it would have been normal to decommission about 800 over the course of the year.

But when the IAEA later reviewed footage from surveillance cameras installed outside the cascade rooms to monitor Iran’s enrichment program, they were stunned as they counted the numbers. The workers had been replacing the units at an incredible rate — later estimates would indicate between 1,000 and 2,000 centrifuges were swapped out over a few months.

The question was, why?

Iran wasn’t required to disclose the reason for replacing the centrifuges and, officially, the inspectors had no right to ask. Their mandate was to monitor what happened to nuclear material at the plant, not keep track of equipment failures. But it was clear that something had damaged the centrifuges.

What the inspectors didn’t know was that the answer they were seeking was hidden all around them, buried in the disk space and memory of Natanz’s computers. Months earlier, in June 2009, someone had silently unleashed a sophisticated and destructive digital worm that had been slithering its way through computers in Iran with just one aim — to sabotage the country’s uranium enrichment program and prevent President Mahmoud Ahmadinejad from building a nuclear weapon.

But it would be nearly a year before the inspectors would learn of this. The answer would come only after dozens of computer security researchers around the world would spend months deconstructing what would come to be known as the most complex malware ever written — a piece of software that would ultimately make history as the world’s first real cyberweapon.

Read the rest of the article.

____________________________________________________________________________

DeepJournal
Sign up for the free mailing list.
12 September 2013  |  
Why is Syria under attack? - Part 4
When you peek below the surface, it becomes clear that Syria is under attack due to the interests of the parties involved. ‘Syria’ is about power, money, influence and energy.
10 September 2013  |  
Why is Syria under attack? - 3
8 September 2013  |  
Why is Syria under attack? - Part 2
In the event of major military conflicts that risk considerable humanitarian and economic consequences, it is useful to examine the interests of all parties involved as well as the role that the media plays in reporting the events.
7 September 2013  |  
Why is Syria under attack? - Part 1
On the surface it’s straightforward: the U.S. wants to liberate Syria from a brutal dictator who is attacking his own people with poison gas. But beneath the surface there is something very different going on.
28 August 2012
Daan de Wit (DeepJournal) interviewt Webster Tarpley op het Magneetfestival
Het Magneetfestival gaat de diepte in met vier interviews. Daan de Wit interviewt Webster Tarpley, Albert Spits, en Mike Donkers.
Contact - About - Donate - RSS Feeds - Copyright © 2006 DeepJournal, All rights reserved