Cyberwarfare on Iran

I heard several of my classmates discuss dangerous on the web Wednesday 7,2012 under the banner Everywhere Malware.  The first two presentations I heard, Anthony Radosti’s on Memories of the Nimda Virus and Adam Cicerini’s on Cyberbomb What Hit Iran Was 1 of 5, Researchers Say, really left an impression.  I began to wonder about the power and possibilities of cyberwarefare.  The main question on my mind after their presentations was, what about conspiracy theories?  How did or could a powerful body play a role in the creation of these viruses?


I have yet to uncover this mystery, but I did look into the STUXNET worm.

The worm was discovered in June 2010 by a Belarus based company.  With analysis by anti-virus companies, more information about the worm was soon revealed.   Having been searching and mobile for over a year without notice, the STUXNET worm was being spread with thumb drives, not over the internet.  This worm was not stealing passwords or identities, it was doing something much more complex.

The worm was looking for something, an operation somewhere in the world using a specific piece of  equipment.  This was the Siemens supervisory control and data acquisition  which is basically a controller for specific types of industry.  The worm would get the code on the PLC controller to collect information when it infected the computer.

The worm would not attack every computer it infected, if the computer it reached was not its specific target, it would leave it alone.  This is a computer worm, and most hackers or creators generally don’t have this sort of courtesy, but STUXNET was clearly not created by your ordinary hacker.

70% of the infections occurred in Iran, where specific Iranian components were used in certain industries that were not used anywhere else in the world.  It was clear the worm was targeting Iran, and it was looking to sabotage their uranium enrichment facilities.

The mystery was revealed in fall of 2010, the worm was created to alter the speed of centrifuges used in these nuclear facilities without the operators knowledge.  In essence, this worm was hitting the computers and creating physical destruction.  It was intended to stay in place for years, sabotaging their computers, and would have if not for anti-virus companies doing research to protect their customers and discovering the worm.

It became clear that the STUXNET creator had to have been a large operation with plenty of insider information.  The attacker had complete details of the plants and the desire to take down nuclear production in Iran, leaving the fingers pointed at the USA or Israel.


Generally speaking, everyone is quite certain the United States was responsible for the STUXNET worm, and even though it was discovered prematurely, it was still a success.

However, this cyberweapon is not a victory without consequence.  The full text of STUXNET can be downloaded off the internet now, meaning this cyberweapon can be studied and used by other countries.  In essence, the creator of the worm has given a how-to guide on attacking them through cyberspace.



Moral of the story, the Illuminati watches your every keystroke and can access your browsing history in a flash.


One thought on “Cyberwarfare on Iran

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s