Blog post

Stuxnet still in the wild – Security researchers taking it apart

By Avivah Litan | March 09, 2012 | 1 Comment

This may be old news to many of you but I just learned that Stuxnet is still very much alive and well, and spreading around. As you know, it was used to interfere and potentially damage closed systems in Iran’s nuclear facilities. Apparently, it can be leveraged to damage lots of other closed systems, like elevators or public rail systems that we ride every day.

One perspective that I heard yesterday which is particularly disturbing is that security researchers are reverse engineering Stuxnet and publishing their findings. The disturbing piece is that this basically helps the bad guys because the security researchers are doing the heavy lifting in figuring out how the malware works.

Is this a time bomb ticking that is ready to burst? I suppose there’s no turning back and that there’s not much any of us can do about it.

Comments are closed

1 Comment

  • Glen says:

    How naive?

    If you understand coding in to direct memory addresses to load the code then this isn’t heavy lifting :/

    They already know that, the 0 days used are patched. The rest is just nomenclature they are exposing.