Wired has published Friday, February 11 an article well documented on the typology of introducing Stuxnet before it activates and causes damage, not easily quantified from within the Iranian nuclear program. The methodology is after all "logical" since can not use the internet, only remain vector physical type removable media (USB) to contaminate a local area networks (but isolated) nuclear program.
Symantec who conducted these tests , is able to say that is driving the attack in March 2010 that earned the success rate of the most important (69%). Two other interesting facts emerge from the report: it took only twelve hours from the successful introduction of Stuxnet and its load becomes active (in terms of software). Finally, Stuxnet seems to have been designed to be only "LAN-based" ("LAN") so as not to escape into the wild (the internet).
If these disclosures are to be confirmed, we can again emphasize the great complexity of this procedure code malicious high-tech. Finally, I note that some of Stuxnet decompiled code is available here . A project on Saturday evening in the evening to do his geek! :)
Moreover, speaking of geek , the web is abuzz these last hours of a persistent rumor: the Anonymous reportedly said to have come into possession of Stuxnet. One can easily imagine the vision of Apocalypse propagated by certain media. The right question to ask is: whose interest what? I think we attending the misinformation and even poisoning informational. This article , serious and substantiated, seems to confirm my feeling.
Moreover, speaking of geek , the web is abuzz these last hours of a persistent rumor: the Anonymous reportedly said to have come into possession of Stuxnet. One can easily imagine the vision of Apocalypse propagated by certain media. The right question to ask is: whose interest what? I think we attending the misinformation and even poisoning informational. This article , serious and substantiated, seems to confirm my feeling.
0 comments:
Post a Comment