Tag: stuxnet

  • Throwback Thursday: Ten memorable Virus Bulletin conference presentations – part 1

    With an excellent conference programme (and still some gaps to fill !), we have much to look forward to when it comes to VB2017, the 27th Virus Bulletin conference . But we also often look back at past conference presentations, not just because we are proud to have had them presented at our conference, but…

  • Throwback Thursday: Ten memorable Virus Bulletin conference presentations – part 1

    With an excellent conference programme (and still some gaps to fill !), we have much to look forward to when it comes to VB2017, the 27th Virus Bulletin conference . But we also often look back at past conference presentations, not just because we are proud to have had them presented at our conference, but…

  • The ghost of Stuxnet past

    Microsoft patches .LNK vulnerability after 2010 patch was found to be incomplete. Mention Stuxnet and you’ll have many a security researcher’s attention. The worm, which was discovered in 2010, used a number of zero-day vulnerabilities to reach its target: air-gapped Windows PCs at the Natanz nuclear plant in Iran. Most prominent among these was CVE-2010-2568…

  • Book review: Countdown to Zero Day

    Kim Zetter’s book on Stuxnet is a must-read for anyone interested in malware – or in 21st century geopolitics. There is a tendency among the media to call every hack ‘advanced’, to blame every attack on a nation state, and to label every industrial failure as ‘cyber’. It is good to approach such stories with…

  • Stuxnet infected Natanz plant via carefully selected targets rather than escape from it

    Five initial victims of infamous worm named. Today, as Wired journalist Kim Zetter publishes her book Countdown to Zero Day on Stuxnet, researchers from Kaspersky and Symantec published blog posts that shine a light on how the malware spread to its likely target, the Natanz plant in Iran, and to hundreds of thousands of other…

  • Flame worm one of the most complex threats ever discovered

    Malware possibly used for cyber-espionage. The jury is out on whether ‘Flame’ (also known as ‘Flamer’ or ‘Skywiper’) is ‘the most lethal cyberweapon to date’ as some have claimed , or just a highly complex and sophisticated piece of malware. But simply from looking at the volume of security vendors’ blog posts dedicated to the…

  • ‘Son of Stuxnet’ trojan found

    ‘Duqu’ used in targeted attacks to steal specific information. Researchers at both Symantec and McAfee have discovered a new Remote Access Trojan (RAT) with strong links to Stuxnet being used in some highly targeted attacks. The trojan, which has been named ‘Duqu’ after the files with prefix ~DQ it creates, shares source code with Stuxnet…