Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

Security IT

Stuxnet's Earliest Known Version Discovered and Analyzed 77

Posted by Unknown Lamer
from the no-u235-for-you dept.
An anonymous reader writes "Symantec researchers have discovered an older version of the infamous Stuxnet worm that caused the disruption at Iran's nuclear facility in Natanz: Stuxnet 0.5. According to a whitepaper released by the researchers at RSA Conference 2013, Stuxnet 0.5 has first been detected in the wild in 2007 when someone submitted it to the VirusTotal malware scanning service, but has been in development as early as November 2005. Unlike Stuxnet versions 1.x that disrupted the functioning of the uranium enrichment plant by making centrifuges spin too fast or too slow, this one was meant to do so by closing valves."
This discussion has been archived. No new comments can be posted.

Stuxnet's Earliest Known Version Discovered and Analyzed

Comments Filter:
  • Re:State sponsored (Score:2, Interesting)

    by jandersen (462034) on Wednesday February 27, 2013 @01:00PM (#43025759)

    Whoever it was, is a complete moron, I suspect. This kind of attack can - and will - be used against everybody else in turn. And if you can interfere with the functioning of valves and other HW, then you can also find a way to cause leakage of hazardous materials.

    How about a major leak in a bio-warfare lab in the States? Would we like that?

What good is a ticket to the good life, if you can't find the entrance?