Symantec: work on Stuxnet worm began two years sooner than first thought
Most of us assume we all know the story of Stuxnet: it is a probably authorities-sponsored worm that performed havoc with Iranian centrifuges in 2009, setting again the nation’s uranium enrichment program with out involving any conventional weapons. Researchers at Symantec, nevertheless, now declare there’s an untold narrative. They’ve found a Stuxnet zero.5 model which will have been in improvement or lively as quickly as November 2005, two years earlier than the generally accepted timeline. It first surfaced on trackers in November 2007, and would have created wider-ranging chaos at Iran’s Natanz nuclear facility by closing very important strain valves as an alternative of utilizing the subtler centrifuge method.
Symantec additionally observed that this pre-1.zero malware shares traits with the Flamer code base, placing it within the context of a good bigger effort than seen thus far. Furthermore, it might have required in depth information of the Natanz infrastructure — this was no informal assault, in accordance with the researchers. Whereas we might by no means know precisely what prompted the revamp, IAEA proof means that Stuxnet wasn’t really efficient till the higher-recognized model got here into play. We principally know that trendy cyberwarfare had its justifiable share of rising pains — and that it isn’t as recent-confronted as we assumed.