Iranian President Mahmoud Ahmadinejad inspects centrifuges at a uranium enrichment plant.
The Iranian government agency that oversees the country's nuclear facilities reported today that engineers are attempting to defend against "Stuxnet," a Windows-specific worm attacking industrial plants throughout the nation. The malware exploits a Windows vulnerability to seek out and compromise industrial systems made by Siemens. It has also been spotted in other countries, but Iranian targets appear to be the most frequently compromised, by far. Affected nuclear sites in Iran include those the US believes are part of a nuclear weapons program.
But the announcement raised suspicions, and new questions, about the origins and target of the worm, Stuxnet, which computer experts say is a far cry from common computer malware that has affected the Internet for years. A worm is a self-replicating malware computer program. A virus is malware that infects its target by attaching itself to programs or documents.
Stuxnet, which was first publicly identified some time ago, is aimed solely at industrial equipment made by Siemens that controls oil pipelines, electric utilities, nuclear facilities and other large industrial sites. While it is not clear that Iran was the main target -- the infection has also been reported in Indonesia, Pakistan, India and elsewhere -- a disproportionate number of computers inside Iran appear to have been struck, according to reports by computer security monitors.
More: New York Times
, NYT Bits Blog
, Al Jazeera
. Stuxnet was discovered this June
and has been the topic of discussion in security circles since; a Symantec advisory is here
Symantec plans to release more technical analysis of Stuxnet in a paper to be released at the Virus Bulletin Conference on September 29th.
German security researcher Ralph Langner has conducted some interesting work on Stuxnet. Note the "analysis" and "theory" provided here. The punchline: "Welcome to cyberwar."
Not a word about this on the English-language website for Iran's official news agency, not yet anyway.
At Vice, Leigh Alexander (recently at Boing Boing) writes about the superstitious rituals we all practice when it comes to technology. We do it whether we are conscious of the ritual or not, and we do it even when we are informed the ritual is harmful to the machines. …blowing on cartridges may have actually […]
Human biases exposed by Implicit Association Tests can be replicated in machine learning using GloVe word embedding, according to a new study where GloVe was trained on “a corpus of text from the Web.”
Hey, it’s your ol’ pal Joel! Used to write a gadget blog that wasn’t about gadgets? Man, great to see you. No, no, have a seat. Can we get a couple of…yeah, no ice, thanks.So let’s get business out of the way before we eat: One of my clients is launching a Kickstarter today and […]
If you own a dog, you’ve most likely heard of BarkBox – the monthly subscription box for dogs. What started as a simple idea to try out the subscription model on pet owners has since developed a cult following of dog lovers. If you haven’t given it a try yet, this one month free deal is the […]
With the iPhone headphone jack having gone by the wayside, we’re excited about the addition of the FRANKLIN Bluetooth Headphones in our store. These headphones are foldable so they’re easy to carry around, but most importantly, they pack impressive sound. Our biggest struggle with Bluetooth headphones is the worry of them dying at the worst moment. This pair lasts an impressive 8-10 […]
Evan Kimbrell, founder of the digital agency Sprintkick, recently released a series of online courses that feature some of the best advice we’ve come across. These courses are well worth your time, and will save you from making many typical mistakes down the line if you ever want to start your own business.With this Business […]