20 thoughts on “Iran Confirms Stuxnet Damage to Nuclear Facilities – Tikun Olam תיקון עולם إصلاح العالم
task-attention.png
Comments are published at the sole discretion of the owner.
 

  1. How it got in: they emailed it to the weakest point in the Iranian chunk of the internet, some low level educational server maybe, and the little monster replicated until it hit the nuclear sites. It was pretty sloppy, unless that was the intention (to act as a foreshadowing of how future bombing raids will go.)

    1. Strelnikov r u dumb!!!!!! hey this article never talked about stuxnet was already in nuclear systems, it already infected industrial systems and the iranian nuclear agency is fightin up the worm to avoid it infect the nuclear facilities. Strelnikov you must to learn to read man!!! hehe. and i got another point, what a heck means “low level educational server”???????? I guess you are a united states citizen, bcuz thats the dumbest expression i ever heard XD. I got an example of low level education: USA have a lower educational level than Mexico right now XD

    2. impossible…those computers at the facility are off the grid

      it could only be implanted through jump stick

      one of the reasons at security facilities in the states, those handy little devices are banned

  2. It’s also likely that Iran was nowhere close to going online with the reactor on October and they are just circulating this story as an excuse. If Stuxnet was really capable of doing what Iran is suggesting, it would be one hell of a worm, the likes of which the world has not seen before.

  3. RE: “…whether the most damaged site was Natanz, the only known plant enriching uranium which might be used in producing a nuclear weapon…” – R.S.

    FROM PAUL WOODWARD, WAR IN CONTEXT, 09/25/10:

    (excerpt)…There is however another argument that can be made in which Bushehr becomes the target of cyberwarfare, even if it might not be a vital node in Iran’s nuclear program. In this scenario, Stuxnet would not be designed to perform its function until the reactor becomes fully operational. At that point, the malware would not simply stop the reactor working — it would trigger a Chernobyl-type nuclear meltdown.

    Why would the attackers want to precipitate such a catastrophic event?
    • In the hope that such an “accident” would make the Iranian government look unfit to safely operate any kind of nuclear program.
    • To undermine Iranian domestic support for the program.
    • To alienate Iran from its Gulf neighbors who would be exposed to the fallout.

    ENTIRE ARTICLE – http://warincontext.org/2010/09/25/bush-white-house-security-adviser-israel-likely-source-of-cyber-attack-on-iran/

      1. jEEZE no IT DID NOT.

        Just cause something is infected doesn’t mean it did
        damage.

        Specify the damage it did?
        Your assuming something without proofs.

        Gerald
        Anthropologist

        1. It’s a waste of time arguing with you. Let’s just say that I trust the word of the most distinguished cyber security experts who disagree with you & point to the destruction of hundreds of Iranian centrifuges at Natanz & similar problems with Bushehr. Numerous media sources, intelligence experts & cyber security experts have speculated for a yr. that this damage was caused by precisely the type of weapon identified as Stuxnet. Do you have knowledge or experience that would compare to theirs & if you claim to have can you prove you do? Otherwise, you’re talking garbage.

          Don’t waste out time.

        1. And you’re arguing that because no damage to control systems was reported in the U.S. that Iran’s security standards are the same as the U.S. & therefore there can’t have been any damage?

          You guys making this silly claim have a major problem. Sabotage has been reported repeatedly over the past yr. at Bushehr & Natanz. We know for a fact that massive numbers of centrifuges have failed at Natanz for no known reason other than sabotage. We know Israel and other nations have been attempting to sabotage these plants. Yossi Melman of Haaretz has reported this. He told me so (though he believes it’s more likely the U.S. is behind it). If it walks like a duck & talks like a duck it prob. IS a duck. I also love how people w. no known security background to speak of are willing to represent their own knowledge as superior to that of cyber security experts who spend their entire careers analyzing this stuff & telling us what it means.

          I’ve been reading professional publications in the cybersecurity industry closely on this subject for a few weeks now & the consensus is as I’ve reported it. Anyone who attempts to claim that Stuxnet was a juvenile hacker prank w. no known impact or damage is advancing an argument that has no credibility.

          1. First, there is a big differnce between infection and damage with most worms, Stuxnet in particular. If you have been reading about Stuxnet (as I have since the news first broke and I have been covering it in some detail on my blog) then you would know that it is a targeted worm designed to actively damage a very limited type and number of facilities.

            Second, I never said that Stuxnet wasn’t targeted at Iraninan facilities. In fact, I have publicly expressed my opinion that it was. I’m just saying that I have not seen, nor is there anything in your report, that would justify that as a claim of fact. Further investigations might (hopefully) show that, until then everyone in the cyber security community is talking about supposition at this point. That is widely reported in the cyber security community.

            Lastly, I have not claimed to be a cyber security expert, but my background in process chemistry, my use of process control systems, and my training in computer programing all make me well qualified to understand most of what those experts are saying.

            Now, if you have heard specific claims of active damage at Iranian facilities caused (or even reasonably supspected) by Stuxnet, please report that. We need to hear that with as much detail as possible. I would clearly understand a reluctance to name sources, there would certainly be Iranian repercussions.

          2. The Iranians would rightfully attempt to conceal precisely the type of information you & I would like to have. But the fact that massive amts of damage have been caused both at Bushehr AND Natanz, & caused in such a way that Stuxnet could easily have been the culprit indicate with a fairly high level of certainty that Stuxnet played a role in this if not the only role. We ain’t never gonna get certainty here unless we find a goldmine of data in some unexpected fashion down the road.

            You should acknowledge the vast preponderance of supposition by actual cyber security experts that Stuxnet did REAL damage to Iran’s command & control systems. Here’s another report fr inside Iran indicating Iran hasn’t rid itself of the worm & its impact.

  4. Mahmoud Jafari, the plant’s project manager, told Iran’s official news agency, IRNA.

    that the worm “has not caused any damage”

    G

Leave a Reply

Your email address will not be published. Required fields are marked *

Share via
Copy link