- Joined
- Jul 26, 2009
- Messages
- 12,177
- Reaction score
- 7,551
- Location
- Ft. Campbell, KY
- Gender
- Male
- Political Leaning
- Independent
BBC News - Stuxnet worm 'targeted high-value Iranian assets'One of the most sophisticated pieces of malware ever detected was probably targeting "high value" infrastructure in Iran, experts have told the BBC.
Stuxnet's complexity suggests it could only have been written by a "nation state", some researchers have claimed.
Gonna take a wild guess and say Israel might have an interest in such an action.
Gonna take a wild guess and say Israel might have an interest in such an action.
Gonna take a wild guess and say Israel might have an interest in such an action.
Quote Originally Posted by Deuce
Gonna take a wild guess and say Israel might have an interest in such an action.
Could be an entire list of nations ranging from Israel to the US to some members of the EU. So far it's just speculation that this was even a nation making this malware. I bet you there are coders out there who could make the most sophisticated viruses ever in under a day in their basement. Remember, it took some kid in Europe 14 hours to crack the state-of-the-art protection on DVDs.
No conclusive evidence, no indictments, no arrests but the best explanation was one of the companies called in a cleaner and made "the problem disappear".
Not that that isn't a great story, but how is a conspiracy theory ever the "best explanation" for anything? A teenage kid about to be put on trial who disappeared? I'd say the "best explanation" is that he took a dive off Lover's Leap and they haven't found the body yet. Tell me, TD, do you also believe in another "best explanation" that involved a grassy knoll?
These people either stole or cracked Verisign certificateS to use with Stuxnet. They exploited four different Windows vulnerabilities, two of which were previously undiscovered. It travels from USB stick to computers w/o the user having to do anything but insert the USB stick. This is not a run of the mill script-kiddie nor something a grad student cooked up in his basement apartment.
It's not all that clear that the infection came through the internet. What I read said that it travels via USB sticks that contractors and engineers used to carry documents etc.So I have to ask how brilliant is it to have sensitive computers on the same internet as Yahoo, Google, and Facebook and crazy old Aunt Fanny and her vibrating monkey?
This makes no sense what so ever. It's like the enemy being able to download images in real time from Predator Drones in a combat zone.
It's crazy times 100.
What do you use to partition?Whenever I buy a USB stick, I always repartition it, then reformat it before using it.
What do you use to partition?
What do you use to partition?
This makes no sense what so ever. It's like the enemy being able to download images in real time from Predator Drones in a combat zone.
And finally is it possible that because of the repressive society in Iran than one of the Boys at the power plant was surfing the web for Muslim porn pictures of Islamic women dressed in scantily made Burkas. And inadvertently pick up a Trojan Horse virus.
Or maybe he was just looking for "Trojans" online and mistakenly found the horse instead. Could happen to anyone.
BBC News - Stuxnet worm 'targeted high-value Iranian assets'
Its only speculation but it seems to have been developed by a country considering its size, complexity and its specificness. How awesome is that story, they should make a movie about it.
BBC News - Stuxnet worm 'targeted high-value Iranian assets'
Its only speculation but it seems to have been developed by a country considering its size, complexity and its specificness. How awesome is that story, they should make a movie about it.
Have to kill and reanimate the PC to fix it sometimes. :mrgreen:I think rootkits are much better just because rootkits are designed to hide in the kernel and are nearly undetectable once installed. Nasty little buggers... It's like herpes/cold sores. Once you get it, you got it for life.
So you're justtalking aout deleting and recreating a partition.You can repartition it in
We use cookies and similar technologies for the following purposes:
Do you accept cookies and these technologies?
We use cookies and similar technologies for the following purposes:
Do you accept cookies and these technologies?