Computer worm Stuxnet ‘badly infected’ Russian nuclear power plant
Stuxnet infected Russian nuclear plant By Darren Pauli on Nov 8, 2013 Jumped airgap, Kaspersky boss says. http://www.scmagazine.com.au/News/363578,stuxnet-infected-russian-nuclear-plant.aspx Stuxnet had ‘badly infected’ the internal network of a Russian nuclear plant after the sophisticated malware caused chaos in Iran’s nuclear facilities in
Natanz.
The malware, widely considered to have been developed by the US Government as a means to disrupt Iran’s nuclear enrichment plans, had crossed a physically separated ‘air-gapped’ network in the Russian plant after it was carried across on a USB device.
Eugene Kaspersky, the charismatic boss of the Russian antivirus company bearing his name, said a staffer at the unnamed nuclear plant informed him of the infection. “[The staffer said] their nuclear plant network which was disconnected from the internet … was badly infected by Stuxnet,” Kaspersky said.
“So unfortunately these people who were responsible for offensive technologies, they recognise cyber weapons as an opportunity.” But USB devices were used to ferry malware cross a far greater air-gap: Russian astronauts had carried a virus on removable media to the International Space Station infecting machines there, Kaspersky said.
In a presentation given at the Canberra Press Club designed to give mainstream journalists a broad overview of the state of information security, the chief executive offered his view of the state of online crime and state-sponsored espionage. “All the data is stolen,” Kaspersky said. “At least twice.”
He said sophisticated malware like Gauss, Flame and Red October were rare and would require around $10 million to build.
Such malware had infected Saudi Aramco knocking it offline for two weeks, Kaspersky noted. Half of all malware was written in Chinese, according to Kaspersky. About a third was written in Spanish or Portuguese, followed by Russian-coded malware that was less prevalent but the most sophisticated in the world, he said.
He said Chinese malware appeared to ‘not care’ about operational security because researchers regularly found personal photos and social networking accounts on servers used in attack campaigns.
2 Comments »
Leave a comment
-
Archives
- December 2025 (301)
- November 2025 (359)
- October 2025 (377)
- September 2025 (258)
- August 2025 (319)
- July 2025 (230)
- June 2025 (348)
- May 2025 (261)
- April 2025 (305)
- March 2025 (319)
- February 2025 (234)
- January 2025 (250)
-
Categories
- 1
- 1 NUCLEAR ISSUES
- business and costs
- climate change
- culture and arts
- ENERGY
- environment
- health
- history
- indigenous issues
- Legal
- marketing of nuclear
- media
- opposition to nuclear
- PERSONAL STORIES
- politics
- politics international
- Religion and ethics
- safety
- secrets,lies and civil liberties
- spinbuster
- technology
- Uranium
- wastes
- weapons and war
- Women
- 2 WORLD
- ACTION
- AFRICA
- Atrocities
- AUSTRALIA
- Christina's notes
- Christina's themes
- culture and arts
- Events
- Fuk 2022
- Fuk 2023
- Fukushima 2017
- Fukushima 2018
- fukushima 2019
- Fukushima 2020
- Fukushima 2021
- general
- global warming
- Humour (God we need it)
- Nuclear
- RARE EARTHS
- Reference
- resources – print
- Resources -audiovicual
- Weekly Newsletter
- World
- World Nuclear
- YouTube
-
RSS
Entries RSS
Comments RSS


[…] Computer worm Stuxnet ‘badly infected’ Russian nuclear power plant […]
Pingback by Le virus informatique Stuxnet a infecté le réseau des installations nucléaires russes | Themis Media A Part | November 11, 2013 |
[…] Go here to see the original: Computer worm Stuxnet 'badly infected' Russian … – Nuclear News […]
Pingback by Window 7 Tech | Computer worm Stuxnet 'badly infected' Russian … – Nuclear News | November 11, 2013 |