Stuxnet is a cyber weapon and computer worm. It was used to sabotage Iran’s nuclear program with what would seem like a long series of unfortunate accidents.[1] It was first released in 2006.[2] It became known only after the release of the second version.[3] In 2010, an error in the code led the virus to spread outside the test labs and to infect computers around the world.[4]
Both the United States and Israel have been accused of developing and releasing Stuxnet.[5] In 2012 the US confirmed that it developed Stuxnet with Israel.[4]
Stuxnet is typically introduced to the target environment via an infected USB flash drive. The worm then spreads across the network, scanning for Siemens Step7 software on computers controlling a PLC. If it doesn't find a target, Stuxnet becomes dormant inside the computer.
Stuxnet is special for different reasons:
It used flaws of the operating system Microsoft Windows which were not known to many people at the time.
The authors had in-depth knowledge of the process visualization system WinCC, which is used to monitor and control technical processes, using the Simatic S7 industrial controller
It uses another rootkit to infect the computers which ruin the control and monitoring software for the industrial board
Even though it targeted PLCs, only very few were infected. The software is written to infect a specific set of PLCs, with well-defined modules. In the case of personal computers, it will infect any computer running the right software.