U.S. tried to Stuxnet North Korea and failed, says former intel officer

North Korean leader Kim Jong Un makes an inspection at the commanding headquarters of the 264 Combined Forces, in this undated photo released by North Korea's Korean Central News Agency (KCNA) in Pyongyang on May 24, 2015.


North Korean leader Kim Jong Un makes an inspection at the commanding headquarters of the 264 Combined Forces, in this undated photo released by North Korea's Korean Central News Agency (KCNA) in Pyongyang on May 24, 2015.

The United States tried to deploy a version of the Stuxnet virus to attack North Korea's nuclear weapons program five years ago, and failed, reports Joe Menn at Reuters.

The operation began in tandem with the now-famous Stuxnet attack that sabotaged Iran's nuclear program in 2009 and 2010 by destroying a thousand or more centrifuges that were enriching uranium. Reuters and others have reported that the Iran attack was a joint effort by U.S. and Israeli forces. According to one U.S. intelligence source, Stuxnet's developers produced a related virus that would be activated when it encountered Korean-language settings on an infected machine.

But U.S. agents could not access the core machines that ran Pyongyang's nuclear weapons program, said another source, a former high-ranking intelligence official who was briefed on the program.

The official said the National Security Agency-led campaign was stymied by North Korea's utter secrecy, as well as the extreme isolation of its communications systems. A third source, also previously with U.S. intelligence, said he had heard about the failed cyber attack but did not know details.

"Exclusive: U.S. tried Stuxnet-style campaign against North Korea but failed" [reuters.com]