The article stops short of saying it's widely believed either the US or Israel are the creators and the US doesn't need to spy on the Europeans.
 
The link between the new malware and espionage seems like a highly contrived attempt by the finders to exploit (if you excuse the phrase) the fame/notoriety that stuxnet was elevated to. I read through and it seemed all it does is capture keystrokes (is that for espionage or bank fraud), it is found in a variety of places (that says nothing), and is not big on replication. What sort of espionage team would go to such great lengths for so little?
 
Thank you for providing the link. A while ago, I also read an article entitled "Duqu virus uses Stuxnet DNA to mine industrial data". In 2010, the computer malware Stuxnet infected nuclear control systems in Iran and it had been profoundly hard for the experts to determine the virus. Recently, a second comparable malware has been discovered, and it was named Duqu. The malware was designed to mine information from European industrial computers. And here is the thing: the virus is intended to download sensitive information that could be used to launch further, destructive effects! That is totally damaging! I hope that a halt will be placed soon to shun the destruction from escalating.
 
Not worried about Stuxnet don't run centrifugals/Siemens step 7 or have a nuclear power plant. Although I noticed on the Symantec report of Stuxnet that Koeberg also sent data to the Stuxnet update server. But weren't worried as Koeberg systems doesn't meet the minimum requirements for malware. Good malware doesn't install itself on crappy system luckily not surprise if they still run windows 95 or Dos 3.1 over there at Koeberg.

Funny thing is they always blame some bloke in China for the malware lol
But Stuxnet was unique. A rootkit on a industrial PLC. Does anyone realize what feat that is. That's a completely different architecture api the works than windows.
The thing about it is people using industrial systems never worried about security. They relied on the vendor of the system for that and placed that responsibility in their hands. In fact the vendors never wanted their customers to add or secure their systems and kept their source code to themselves.
After Stuxnet all that changed. Everyone got a wake up call. Stuxnet wasn't for espionage it was for Sabotage and to do it quickly. They changed the centrifugals for a a long period thousands of them without realizing what's happening. No internet connection to the plants it hid itself all 1.5mb of it on a Usb stick where it used the old conflicker trick with the Autorun and lnk exploit. It had 6 exploits to choose from when it wanted to infect a system.

There's one piece of malware still out there lying somewhere waiting. Conflicker. It has the ability to hide on a network waiting for updates before it goes active and spread again.
 
Top
Sign up to the MyBroadband newsletter