#Stuxnet

2025-06-26

Podcast: Kritische Infrastrukturen — wenn IT-Sicherheit zur Schwachstelle wird

Nach dem US-Angriff auf Irans Atomprogramm wächst die Sorge vor Cyberangriffen auf westliche Infrastruktur.

heise.de/news/Podcast-Kritisch

#Journal #Podcast #Stuxnet #TheyTalkTech #news

Dr. Francis B. Grössqugart@mastodon.online
2025-06-25

Seems like #Stuxnet is still more efficient than #TACO

Alexandre Dulaunoyadulau@infosec.exchange
2025-06-25

After all the hype and headlines, STUXNET still takes the crown.

#stuxnet #iran

Andy 'Bob' Brockhurst :donor:b3cft@infosec.exchange
2025-06-22

@stux

#stuxnet
ha, was literally explaining Stuxnet to my Mrs this morning.

I really need to read Kim's book.

2025-06-22

Remember #stuxnet?

If not, I really recommend doing a deep dive:
youtube.com/watch?v=zBjmm48zwQ

Personally I am pretty sure the NSA and maybe NSO is behind the virus and at the time it was the same old story

Infect half the internet in hopes it would end up on computers in nuclear refineries in Iran so it would mess with the feq of the centrifuges to make them unusable (very short story)

The US will do anything to "achieve its goals", I am convinced of that

2025-06-17

Happy Stuxnet Day, everyone!

May the centrifugal force be with you!

en.wikipedia.org/wiki/Stuxnet

#stuxnet #InfoSec #Iran

@villebooks @GM7077 #Stuxnet pay back time! ✊

Markus Feilnermfeilner
2025-05-23

calcalistech.com/ctechnews/art
For my article about the
drama of (coming soon on ) I have an interesting backgroud read for my dear followers: Isn't it interesting where the people that bought owncloud came from? And those guys, that some say where involved in the development of , told us that they bought owncloud because of OCIS technology (owncloud infinite scale), which they called "best on the market" and the "future platform for us"

Negative PID Inc.negativepid
2025-05-21

💻⚔️ Explore the groundbreaking world of cyberwarfare with our in-depth article on Stuxnet. Uncover the story behind Stuxnet, its impact, and the secret world of cyber defence and espionage! 🚀🔒

negativepid.blog/how-stuxnet-c

2025-04-06

(2010)

🎯 Objective: To sabotage Iran’s nuclear enrichment program.

⚠️ Significance:

First-ever cyber weapon in history.

Specifically designed to physically damage industrial infrastructure (SCADA systems).

🛠️ Mechanism of Attack:

Infected Windows-based systems via USB drives and zero-day .

Targeted and took control of Siemens Step7 software used in PLCs (Programmable Logic Controllers).

Davi Pinheirodavipinheiro
2025-01-21

DOCUMENTÁRIO: VÍRUS DE WINDOWS SABOTA PROGRAMA NUCLEAR DO IRÃ

O documentário “Zero Days” foi banido. Então disponibilizei ele completo acima, legendado em para você assistir. O vírus foi criado pelo americano, comandado pelos , dentre eles a própria . No código original do vírus que disponibilizei abaixo você pode perceber que para o código assumir privilégio de administrador do Windows foi usado…

davipinheiro.com/documentario-

2025-01-03

Collaborative Enterprise CyberCrime International Edition #stuxnet

kriware :verified:kriware@infosec.exchange
2024-11-13

Stuxnet Rootkit Analysis and Simulation

This GitHub project provides a detailed simulation of the Stuxnet rootkit's operation, useful for cybersecurity education and research on complex malware behavior.

github.com/ring0-c0d3-br34k3r/

#Stuxnet #reversing

2024-10-20

If anyone is interested, this is a more deep dive into #Stuxnet
youtube.com/watch?v=zBjmm48zwQ

Super interesting!

2024-10-20

The #Stuxnet #Cyberweapon Explained by a Retired Windows Engineer
youtube.com/watch?v=EOPLN-MVKY

2024-10-08
Stuxnet, un ataque de falsa bandera

Corrian los albores del año 2010 cuando miles de publicaciones en todo el mundo daban el grito de alerta: #Stuxnet, un virus informatico se distribuia por internet e infectaba miles de computadoras... aunque nadie se habia quejado de daños o reconocia sentirse afectado por la presencia de este gusano.

Nadie sabia realmente de las consecuencias que podria acarrear infectarse con este gusano, pero una cosa era segura, y en ese punto todos los rumores apuntaban en la misma direccion: Este gusano solo podia proveninir desde laboratorios en #China o #Rusia con la intencion de afectar insfraestructura critica... ¿pero donde?

Los hechos se sucedian como en camara lenta y a diario los medios informaban de la cantidad de nuevos infectados.

Hasta que la bomba de tiempo de la que sospechosamente nadie sabia nada, se activo y fialmente todos nos enteramos cual habia sido el objetivo final de este gusano: Destruir o al menos dañar seriamente el programa nuclear de #Iran

Esto echaba por tierra todos los "rumores" que se daban por cierto sobre su origen en los "malvados de siempre", ya que curiosamente a pesar de que el gusano infecto miles de computadoras, unica y exclusivamente las que estaban asociadas al programa nuclear irani fueron dañadas.

¿Y quien podria tener esas intenciones? Investigaciones forenses posteriores dieron luces al respecto. Solo #EEUU, #UK e #Israel podrian estar detras de todo este entramado.

Y como era natural, los medios levantaron toda una cortina de humo de acusaciones contra los rusos y chinos para que la opinion publica quedara neutralizada. Una vez mas los medios de siempre hacian su trabajo.

Stuxnet fue el caso mas mediatico y probablemente el unico bien documentado de como la #NSA practico terrorismo abiertamente.

NYT finalmente lo reconocio todo.
2024-10-08
@feliz1984 ¿ Te dice algo #Stuxnet ?

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst