17 April 2012

US-Backed Terrorist Group, Israel behind Stuxnet Virus Attack on Iran

The Stuxnet malware was not only designed to disrupt Iran's nuclear program, but was part of a wider campaign directed from Israel that included the assassination of the country's nuclear scientists, US intelligence officials revealed.

The source for the latest explanation of Stuxnet's mysterious provenance is online title ISS Source, which cites having received information from unnamed individuals "who requested anonymity because of their close proximity to investigations". 

The source told the site that an Iranian agent infected Iranian systems at the Natanz nuclear facility with the Stuxnet malware directly using a USB stick. The malware exploited a raft of zero-day vulnerabilities to attack SCADA software. 

The individual carrying out the attack was a member of the terrorist Mojahedin-e-Khalq Organization (MKO, also known as the MEK, NCR and PMOI) which was connected to the assassination of several Iranian nuclear scientists in the last three years...........

Recent reports have also revealed that the United States' military and spying agencies have long been training members of the MKO for assassination and sabotage operations in Iran. 

Stuxnet was a comprehensive US-Israeli program designed to disrupt Iran's nuclear technology.....

If the story has a seam of truth it is dynamite; if it is untrue, it will add to the mythic status of a piece of malware that has been widely assumed to be state-sponsored since it became apparent that it targeted industrial systems. 

The story raises questions of its own. Why use a worm at all when the attack was targeted enough to be distributed using a USB stick? The worm method is designed to spread, something which by its nature draws attention. This seems like unnecessary overkill for a direct infection. 

The involvement of Israel and the US is no surprise - they have a clear motivation, given their animosity towards Iran............. 
Click here to read more ....

Solutions : www.xcyss.in

No comments:

Post a Comment