IDG News Service - The Stuxnet worm hit centrifuges used to enrich uranium at Iran's nuclear sites, the Reuters news agency quoted Iran's President Mahmoud Ahmadinejad as saying Monday.
According to the report, Ahmadinejad said that enemies of Iran "succeeded in creating problems for a limited number of our centrifuges with the software they had installed in electronic parts," speaking in a news conference. "They did a bad thing. Fortunately our experts discovered that and today they are not able (to do that) anymore," he added.
The comments apparently provide confirmation that Iran's nuclear program was indeed the target of the most talked-about computer worm of the year. Discovered in July, Stuxnet is the first worm designed to attack industrial systems such as power plants or nuclear reactors.
Iran had previously confirmed that the worm affected systems in the country, including non-critical systems at a nuclear reactor. But this is the first time it has said that Stuxnet also affected centrifuges.
Security researchers now believe that Stuxnet had at least two targets: centrifuges such as the ones Ahmadinejad referred to on Monday, and another type of industrial system targeted with what's known as the worm's 417 attack code.
Stuxnet researcher Ralph Langner believes that this second target may have been a turbine at Iran's Bushehr nuclear reactor.
Stuxnet is unusual in that it seeks out very specific industrial systems and then tries to disrupt their operations. With Ahmadinejad's comments, we now know what one of those targets was, said Eric Byres, chief technology officer with Byres Security. "We've got a pretty small set of potential victims, and one of the victims is sticking up their hand to say, 'Yeah we got hit.'"
The worm is designed to slow down and then speed up centrifuges, either ruining the uranium being refined or stressing the devices so much that they break, Byres said.
"The thing we don't know right now is what the heck was the second victim," he added.
This state transportation department uses computer science students from a local university as programming interns, and everyone is happy with the arrangement -- until one intern learns how to bring down the mainframe.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Changing the Way Government Works: Four Technology Trends that Drive Down Costs and Increase Productivity
- This paper discusses four technology-based approaches to improving processes and increasing
productivity while driving down department and agency costs.
- Path Selection Infographic
- Path Selection Infographic
- Hyperconvergence Infographic
- A wide range of observers agree that data centers are now entering an era of "hyperconvergence" that will raise network traffic levels faster...
- Preparing Your Infrastructure for the Hyperconvergence Era
- From cloud computing and virtualization to mobility and unified communications, an array of innovative technologies is transforming today's data centers.
- How WAN Optimization Helps Enterprises Reduce Costs
- If you wanted to break down innovation into a tidy equation, it might go something like this: Technology + Connectivity = Productivity. Productivity... All Government IT White Papers
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Mobile Security: Containerizing Enterprise Data In this on-demand webinar, Fixmo's Lee Cocking, VP of corporate strategy, explains why Apple-ization trends like mobility and "bring-your-own-device" (BYOD) are driving the...
- Endpoint Data Management: Protecting the Perimeter of the Internet of Things Not surprisingly, "Internet of Things" (IoT) and Big Data present new challenges AND opportunities for enterprise IT. Teams need to harness, secure and...
- How to Protect Enterprise Data Yet Enable Secure Access for End Users Learn how BYOD, Big Data and the use of rogue applications and devices is putting corporate data at risk, best practices from IT...
- All Government IT Webcasts