Hi All,

An  industrial control security researcher in Germany who has analyzed the
Stuxnet computer worm is speculating that it may have been created to
sabotage a nuclear plant in Iran.

The worm, which targeted computers running Siemens software used in
industrial control systems, appeared in July and was later found to have
code that could be used to control plant operations remotely. Stuxnet
spreads by exploiting three holes in Windows, one of which has been patched.

The high number of infections in Iran and the fact that the opening of the
Bushehr nuclear plant there has been delayed led Ralph Langner to theorize
that the plant was a target. Langner gave a talk on the subject at the
Applied Control Solutions' Industrial Control Cyber Security conference
today and published details of his code analysis on his Web site last week


 http://www.langner.com/en/index.htm

and the UPI screenshot of a computer screen at the Bushehr plant running the
targeted Siemens software. was in this link:

http://www.upi.com/News_Photos/Features/The-Nuclear-Issue-in-Iran/1581/2/


Regards,
Amardeep Thakur,

-- 
You received this message because you are subscribed to the Google Groups 
"nforceit" group.
To post to this group, send an email to [email protected].
To unsubscribe from this group, send email to 
[email protected].
For more options, visit this group at 
http://groups.google.com/group/nforceit?hl=en-GB.

Reply via email to