Russian view of Stuxnet.
From a Russian source.
None of which have we confirmed.
None of which have we confirmed.
"I do not know what weapons will be fighting in World War III, but in the fourth to move go stones and clubs"
Stuxnet successfully hit 1368 of 5000 centrifuges at the uranium enrichment plant at Natanz, as well as disrupted launch date of nuclear plant at Bushehr.
careless employee Siemens, inserting an infected USB flash drive into a workstation. Damage to Iran's nuclear facilities, comparable with the damage from Israeliair attacks.
Iran is helpless before the techno-threat.
Iran's nuclear facilities in Natanz have also suffered very severely: 1368 of 5000 centrifuges were destroyed by the actions of Stuxnet.
This malicious program was created to control manufacturing processes, in the literal sense, to manage the huge production capacity.
it should be emphasized that last summer (remember, the spread Stuxnet began in 2009), resourceWikiLeaks reported serious nuclear accident in Natanz. Shortly thereafter, it became known that the head of the Atomic Energy Organization of Iran , Gholam Reza Aghazadeh (Gholam Reza Aghazadeh) resigned without explanation. Around the same time, media have statements of Israeli politicians and military about a possible confrontation with Iran on the technology front.
In addition, Israel has corrected the projected date of receipt of Iran's atomic bomb, pushing her in 2014, and the powers of Meir Dagan (Meir Dagan) , head of the Mossad, has been extended for the sake of his involvement in unspecified "important projects".
Noteworthy is the history of primary infection, marked the beginning of the spread of the virus. Obviously, the automated control system of this level are not connected to the web. An expert from Kibertsentra NATO in EstoniaKenneth Gears (Kenneth Geers) at a conference on security, suggested that the success of the attack Stuxnet depended entirely on contact with the right people ... and elementary USB-drives. "You can pay someone who will run the trojan in a closed system, or replace the memory stick, which was intended for internal use only" - reflects Gears.- "Just insert a standard USB-connector infected the stick, and Stuxnet immediately jumps automatically to the operating system, and no anti-virus programs and other measures to protect it is not a hindrance." Indeed, the "weak link" was the human factor - Stuxnet was entered into the system via the usual USB-drives, which inadvertently put in the workstation negligent employee. It is noteworthy that after the statement by Minister of Intelligence of Iran Heidar Moslehi (Heydar Moslehi) on the detention of "nuclear spies" (they were absolutely not involved in the Russian equipment), manual Siemens has recognized that the virus have brought the company's employees, stressing the unintentional contamination. It should be noted that Stuxnet affects only a specific type of controllers, Siemens,
And indeed, the head of the newly created U.S. Kibershtaba at the Pentagon, Gen. Keith Alexander (Keith Alexander) , speaking in Congress, has publicly stated that over the past few years the threat of cyberwarfare is increasing rapidly.
NATO isn't equipped to handle this.
Their guide lines don't indicate what is an act of war."The virus Stuxnet demonstrated how seriously we should relate to cyber security because with the help of these products can be destroyed vital infrastructure. In the case of Iran, the virus was, it seems, is aimed against a nuclear program, but similar viruses can destroy our economy, which is controlled by computers. It should be discussed in NATO: if a rocket destroys power, enters into force section 5. But how to act in case of attacks of computer viruses? "- Asked Mr. Toomas Hendrik.
"The first of these principles is that we should recognize cyberspace what it has already become - the new war zone. In the same way as land, sea, air and outer space, cyberspace, we must consider how the scope of our actions, we will defend and which extend its military doctrine. That's what prompted us to create a unified Kiberkomandovanie in the Strategic Command.
Dmitry Rogozin , the permanent representative of Russia to NATO, to take place in the alliance process. Apparently, Russia is extremely concerned about the upcoming NATO summit in Lisbon, which will be held on November 20, after all it is planned to clarify the dilemma is whether to attack military and government computer networks NATO member occasion to use the 5-th article of the Washington Treaty and reply collective military strike.
Thus, against the backdrop of hysteria, provoked Stuxnet, several states expressed the need for the formation of a joint policy for the prevention of cyber attacks. Will this lead to the desired result, even if we assume that will be worked out (and signed) a document regulating the use of destructive technologies? To us it seems very doubtful, too great temptations offered by high tech: the anonymity, security (for attack), an unprecedented ratio of price / performance ratio. " So, Stuxnet was only the first swallow era of techno-social revolution that began not just as dreamed.
The Russians also are working on the wrong cyber security paradigm building security software to defend networks. Ignoring the OS insecurity problem.
The Russians fear Stuxnet.
I'm sure they have RBN hard at work.