The Stuxnet Attack On Iran's Nuclear Plant Was 'Far More Dangerous' Than Previously Thought
View all Offers
- 26% OFF
Samsung Galaxy M52 5G (ICY Blue, 6GB RAM, 128GB Storage) Latest Snapdragon 778G 5G | sAMOLED 120Hz Display₹ 25999₹ 34999Buy On
- 13% OFF
Redmi 9 Prime (Mint Green, 4GB RAM, 64GB Storage)- Full HD+ Display & AI Quad Camera₹ 10499₹ 11999Buy On
- 29% OFF
Samsung Galaxy M32 5G (Sky Blue, 6GB RAM, 128GB Storage)₹ 16999₹ 23990Buy On
- 24% OFF
OPPO A74 5G (Fluid Black,6GB RAM,128GB Storage) - 5G Android Smartphone | 5000 mAh Battery | 18W Fast Charge | 90Hz LCD Display₹ 15990₹ 20990Buy On
- 27% OFF
Samsung Galaxy M12 (Blue,4GB RAM, 64GB Storage) 6000 mAh with 8nm Processor | True 48 MP Quad Camera | 90Hz Refresh Rate₹ 9499₹ 12999Buy On
But the exploit had a previous element that was more complicated and "changed global military strategy in the 21st century," according to Langer.
The lesser-known initial attack was designed to secretly draw "the equivalent of an electrical blueprint of the Natanz plant, to understand how the computers control" the centrifuges used to enrich uranium, Peter Sanger of The New York Times reported last June.
Langer adds that the worm also subtly increased the pressure on spinning centrifuges while showing the control room that everything appeared normal by replaying the plant's protection system values while the attack occurred.
The goal of the worm was not aimed at destroying centrifuges, but "reducing lifetime of Iran's centrifuges and making the Iranians' fancy control systems appear beyond their understanding," Langer writes.
He notes that the coding was "so far-out, it leads one to wonder whether its creators might have been on drugs." (The worm was reportedly tested at
Only after years of undetected infiltration did the U.S. and Israel unleash the second variation to attack the centrifuges themselves and self-replicate to all sorts of computers.
The second Stuxnet is considered the first cyber act of force, but the new details reveal that the impact of the first virus will be much greater. That's because one of the most innovative aspects of the initial virus was how it was delivered into Natanz through a worker's thumb drive, thereby taking advantage of the weakest link: humans.
The sober reality is that at a global scale, pretty much every single industrial or military facility that uses industrial control systems at some scale is dependent on its network of contractors, many of which are very good at narrowly defined engineering tasks, but lousy at cybersecurity.
Or as one of the architects of the Stuxnet plan told Sanger: "It turns out there is always an idiot around who doesn't think much about the thumb drive in their hand."
Given that the next attackers may not be nation-states, they may be much more likely to go after civilian critical infrastructure. Langer notes that most modern plants operate with a standardized industrial control system, so "if you get control of one industrial control system, you can infiltrate dozens or even hundreds of the same breed more."
- Best barbeque sets for an easy grill
- Has the legal battle between PhonePe and BharatPe over ‘Pe’ been going on for too long?
- A panel headed by a retired judge will probe if the Indian government used Pegasus to spy on journalists and other prominent citizens
- Sustainability in India is not just about 'going green’ but also topped with societal needs like equality, inclusiveness, and wellbeing: Report
- Fuel prices surged again by 35 paise per litre after a two-day break