Stuxnet is Evolving (Duqu)

It’s no surprise to see a return of the infamous stuxnet virus. With the source code being so readily available, it was only a matter of time.

This time the virus isn’t designed to really ‘attack’ anything, but rather gather information for a future attack. In the original stuxnet attack, stolen certificates were taken from both Siemens and Realtec. This time, the certificate was stolen from Symantec.

Once again, the attacking body is unknown, and the intentions are unknown. Only time will tell what this virus has done. The threat is still very new.

Article 1
Article 2
Article 3

 

 

 

 

 

Advertisements

2 thoughts on “Stuxnet is Evolving (Duqu)

  1. What do you expect when everyone knows you have it and are possibly developing it. Don’t handle anything you cannot protect in the first place.

  2. The real problem is that not many organizations are doing anything about it. From what I’ve read, companies are not investing in cyber security and are still susceptible to attack.

    http://www.csmonitor.com/USA/2011/0926/A-year-of-Stuxnet-Why-is-the-new-cyberweapon-s-warning-being-ignored

    The really disturbing part is the small investment that is needed to severely damage something on the other side of the world. All it takes is time and persistence and a terrorist group could damage one of our U.S. power grids or nuclear reactor. It probably will not be a concern until it affects something on U.S. soil. By then it will be too late. I hope all the ISF students are studying hard, they will definitely be busy (and probably wealthy) in the upcoming years.

Comments are closed.