GCIS CYBER-SECURITY BRIEFING: Report: Stuxnet Hit 5 Gateway Targets on Its Way to Iranian Plant

 

ISSUED BY: GCIS Communications Command Center

SOURCE: Wired.com: Threat Level

12February2011 5:39pmEST

GCIS CYBER-SECURITY UPDATE: Attackers behind the Stuxnet computer worm focused on targeting five organizations in Iran that they believed would get them to their final target in that Stuxnetcountry, according to a new report from security researchers.

The five organizations, believed to be the first that were infected with the worm, were targeted in five separate attacks over a number of months in 2009 and 2010, before Stuxnet was discovered in June 2010 and publicly exposed. Stuxnet spread from these organizations into other organizations on its way to its final target, which is believed to have been a nuclear enrichment facility or facilities in Iran.

“These five organizations were infected, and from those five computers Stuxnet spread out — not to just computers in those organizations, but to other computes as well,” says Liam O Murchu, manager of operations for Symantec Security Response. “It all started with those five original domains.” (read full report)

 

 

"GCIS INTELLIGENCE UPDATE" is an intelligence briefing presented by Griffith Colson Intelligence Service, and provided to the public for informative purposes only. All subject matter is credited to it's source of origin, and is not intended to represent original content authored by GCIS, it's advertisers or affiliates. All opinions presented are those of the author, and not necessarily those of GCIS or it's partners.