Researchers say Stuxnet was deployed against Iran in 2007

Researchers at Symantec Corp. have discovered a computer virus Stuxnet version used for the nuclear program of Iran to attack in November 2007, two...

Researchers say Stuxnet was deployed against Iran in 2007
Researchers at Symantec Corp.

have discovered a computer virus Stuxnet version used for the nuclear program of Iran to attack in November 2007, two years earlier than previously thought.

Stuxnet, which is widely believed to have been developed by the United States and Israel, was discovered in 2010 after being used for a reprocessing uranium to attack Natanz, Iran. It was the first known example of the public that a virus is used to industrial machinery to attack.

Symantec researchers said Tuesday it is a piece of code, which they called “Stuxnet 0.5,” among the thousands of versions of the virus was discovered, she recovered from infected computers.

They found evidence Stuxnet 0.5 has been in development since 2005, when Iran is still setting up the uranium enrichment plant and the virus was deployed in 2007, the same year the Natanz plant went online.

“It’s really great that they thought such a project in 2005 to create,” Symantec researcher Liam O’Murchu told Reuters.

security experts who have examined

Symantec 18-page report on Stuxnet 0.5 has said he showed the cyber weapon was powerful enough to paralyze the production of fuels at Natanz where six years ago.

“This attack was the centrifuges have been damaged as a number without destroying the operator of the facility would be suspicious,” said a report by the Institute for Science and International Security, which is headed by former weapons inspector David Albright of the United Nations and closely monitors Iran’s nuclear program.


Although he did not know what damage Stuxnet could have caused 0.5, Symantec said it was designed to Natanz to attack by opening and closing valves hexafluoride gas supply of uranium in centrifuges, without the knowledge of the operators of the facility.

Earlier versions

decompose Stuxnet are believed to have been used for the enrichment process to sabotage by changing the speed of the gas centrifuges spinning the knowledge of their operators.

“The report provides evidence more concrete than the United States is the activity of trying to Iran’s nuclear program that derail it was revived in the government of President Mahmoud Ahmadinejad,” said John Bumgarner, an expert in cyber weapons that works as chief technology officer of the Cyber ​​Consequences Unit United States.

The Natanz was the subject of scrutiny by the United States, Israel and their allies, who accuse Iran wants to build a nuclear bomb.

The United States began a complex cyber weapon built during the administration of George W. Bush to prevent Tehran from acquiring nuclear weapons, U.S. officials familiar with the program told Reuters. The government has refused to comment on reports and investigations into the leak of the computer programs.

Since the discovery of Stuxnet

in 2010, security researchers have a handful of other pieces of advanced computer code discovered, according to them, were developed in tandem for espionage and war. These include flame Duqu and Gauss.


Stuxnet was written using much of the same code as the flame according to the Symantec report, which was published at the RSA Conference in San Francisco, an event attended by more than 20,000 security professionals.

Symantec said it is now four versions of Stuxnet discovered and there are probably others that have not been discovered. Researchers at Symantec and elsewhere still trying to get the full extent of the ability of the virus to understand.

“The number of filling holes,” said O’Murchu.

He said investigators found no evidence to prove who was behind Stuxnet.

later versions of Stuxnet, that industrial control software known as Step 7 from Siemens AG treats, more advanced methods used to infect computer systems, he said.

Siemens said previously connected security holes that allowed Stuxnet breached its software. A spokesman did not comment on the latest research from Symantec.

Leave a Reply