Stuxnet is back, Iran admits

The infamous malware is back, and it's "more violent, more advanced and more sophisticated" than ever

malware

A new version of the infamous Stuxnet worm has been used to attack Iranian government networks, according to reports.

The famous malware has apparently re-emerged, with Israeli news programme Hadashot stating that Iran "has admitted in the past few days that it is again facing a similar attack, from a more violent, more advanced and more sophisticated virus than before, that has hit infrastructure and strategic networks".

Iranian General Gholam Reza Jalali also confessed that "recently we discovered a new generation of Stuxnet which consisted of several parts... and was trying to enter our systems," according to the Islamic Society of North America.

Iran has not specified which networks were attacked, or how successful the attack was. It has also not named any suspects as to who orchestrated the attack.

Stuxnet first made headlines in 2010, when the malware was used to target Iran's nascent nuclear sector. It marked one of the earliest uses of malware in nation-state attacks, and was widely-hailed as the first example of malware specifically designed to attack industrial control systems.

The first Stuxnet attack is widely believed to have been carried out as a joint operation by US and Israeli intelligence agencies, with the goal of derailing the development of Iran's nuclear weapons programme. The Israeli government has, according to Hadashot, remained silent on its potential involvement in the latest attack.

Stuxnet used no less than four zero-day exploits in its original form, and was used as a basis for creating further strains of malware than have been used by cybercriminals for the past eight years, including Duqu, Flame and Gauss.

"Now, over 22 million pieces of malware use that blueprint to attack organisations and states alike across the world," said Broderick Perelli-Harris, senior director of professional services at security firm Venafi.

"It's easy for organisations and governments to ignore when it's used against an adversarial state, but the blueprint remains 'in the wild' for cybercriminals to exploit. The new Stuxnet reminds us that governments need to think very carefully when they are creating cyber-arms, so that they do not escalate the problem. Cyber weapons are much more prone to proliferation and almost impossible to control, it's nave to think we can."

Featured Resources

Digital document processes in 2020: A spotlight on Western Europe

The shift from best practice to business necessity

Download now

Four security considerations for cloud migration

The good, the bad, and the ugly of cloud computing

Download now

VR leads the way in manufacturing

How VR is digitally transforming our world

Download now

Deeper than digital

Top-performing modern enterprises show why more perfect software is fundamental to success

Download now

Recommended

Microsoft spearheads industry-wide charter against AI cyber attacks
Security

Microsoft spearheads industry-wide charter against AI cyber attacks

23 Oct 2020
Weekly threat roundup: Chrome, Citrix and WordPress
Security

Weekly threat roundup: Chrome, Citrix and WordPress

23 Oct 2020
IT services giant Sopra Steria falls victim to Ryuk ransomware
Security

IT services giant Sopra Steria falls victim to Ryuk ransomware

23 Oct 2020
CMS platforms succumb to KashmirBlack botnet as businesses rush online
Security

CMS platforms succumb to KashmirBlack botnet as businesses rush online

22 Oct 2020

Most Popular

The top 12 password-cracking techniques used by hackers
Security

The top 12 password-cracking techniques used by hackers

5 Oct 2020
The enemy of security is complexity
Sponsored

The enemy of security is complexity

9 Oct 2020
IBM and SAP expand partnership to support software on hybrid cloud
Cloud

IBM and SAP expand partnership to support software on hybrid cloud

21 Oct 2020