More revelations about the extent of Stuxnet's reach have surfaced, courtesy of the head of Russian anti-virus firm Kaspersky Lab.
Eugene Kaspersky, the CEO and Chairman of his namesake company, said that the sophisticated malware also infected a Russian nuclear plant around the height of reports on the threat during "the Stuxnet time," as he put it.
When Stuxnet was made public in June 2010, a New York Times article contended that the worm was a creation of the United States and Israel to undermine Iran's nuclear program. The malware specifically targeted Siemens supervisory control and data acquisition (SCADA) systems that are used to manage plant industrial processes.
Kaspersky shared the revelations at Australia's National Press Club last week.
According to the CEO, a “friend” of his who worked at the unnamed plant in Russia told him of the incident, which occurred after Stuxnet hit Iranian facilities in Natanz.The nuclear plant network, which was disconnected from the internet, was “badly infected by Stuxnet,” Kaspersky said in Australia.
Last November, U.S. oil giant Chevron also revealed that Stuxnet ran loose beyond its intended targets in 2010 and infected its network. At the time, a Chevron spokeswoman claimed that the company was not negatively impacted by the cyber attack.
The utter lunacy on the part of the US and Israel in undertaking this type of attack should be lost on no one!
If you are at all unfamiliar with Stuxnet:
1-How this cyber attack launched by Israel and the US works is explained in the interview with James Bamford: James Bamford: NSA, US Space Command & the Global Brave New World of Surveillance
2-Going way back to 2010: Israel responsible for Stuxnet attack
3-New York Times finally reports on what was known a year earlier- 2011: Stuxnet, tested in Israel, developed with the aid of the US