Stuxnet: Anatomy of a Computer Virus
Posted: Thu Jun 23, 2011 10:41 am
worldwide dubstep community
https://www.dubstepforum.com/forum/
io9 wrote:
Stuxnet has infected a Russian nuclear plant and the Space Station
The problem with creating Stuxnet, the world's most sophisticated malware worm, is that it could eventually go rogue. Which is precisely what has happened. The US- and Israeli-built virus has spread to a Russian nuclear plant — and even the International Space Station.
Stuxnet is an incredibly powerful computer worm that was created by the United States and Israel to attack Iran's nuclear facilities. It initially spreads through Microsoft Windows and targets Siemens industrial control systems. It's considered the first malware that both spies and subverts industrial systems. It's even got a programmable logic controller rootkit for the automation of electromechanical processes.
Let that last point sink in for just a second. This thing, with a little bit of coaxing, can actually control the operation of machines and computers it infects.
For more on Stuxnet, I highly encourage you to watch this sobering TED talk by Ralph Lagner where he describes it as "a 21st century cyber weapon."
This thing is seriously badass, and now it's on the loose. Speaking to journalists in Canberra, Australia, last week, Eugene Kaspersky — the head of the anti-virus and cyber protection firm with the same name — was tipped off about the damage by a colleague who works at the Russian plant.
The Times of Israel reports:Stuff like this worries the hell out of me, particularly when I think about the potential for weaponized AI — weak and narrow systems that will work outside of human comprehension and control. Not the kind of thing we'll want to have "boomeranging" on us.Kaspersky did not say when the attacks took place, but implied that they occurred around the same time the Iranian infection was reported. He also did not comment on the impact of the infections on either the nuclear plant or the space station, but did say that the latter facility had been attacked several times.
The revelation came during a question-and-answer period after a presentation on cyber-security. The point, Kaspersky told reporters at Australia's National Press Club last week, was that not being connected to the Internet — the public web cannot be accessed at either the nuclear plant or on the ISS — is a guarantee that systems will remain safe. The identity of the entity that released Stuxnet into the "wild" is still unknown (although media speculation insists it was developed by Israel and the United States), but those who think they can control a released virus are mistaken, Kaspersky warned. "What goes around comes around," Kaspersky said. "Everything you do will boomerang." [emphasis added]
Yikes. Apparently, the virus spread to the International Space Station on a Stuxnet-infected USB stick that was transported by Russian cosmonauts.

makes me want to buy a 303 and put out tracks under the name STRAITACIDThird, other Equation Group source code makes reference to "STRAITACID" and "STRAITSHOOTER." The code words bear a striking resemblance to "STRAITBIZARRE," one of the most advanced malware platforms used by the NSA's Tailored Access Operations unit. Besides sharing the unconventional spelling "strait," Snowden-leaked documents note that STRAITBIZARRE could be turned into a disposable "shooter." In addition, the codename FOXACID belonged to the same NSA malware framework as the Grok keylogger.
