Names | Stuxnet W32.Stuxnet | |
Category | Malware | |
Type | ICS malware, Worm, Rootkit, Wiper | |
Description | (Wikipedia) Stuxnet is a malicious computer worm, first uncovered in 2010, thought to have been in development since at least 2005. Stuxnet targets supervisory control and data acquisition (SCADA) systems and is believed to be responsible for causing substantial damage to the nuclear program of Iran. Although neither country has openly admitted responsibility, the worm is widely understood to be a cyberweapon built jointly by the United States and Israel. | |
Information | <https://en.wikipedia.org/wiki/Stuxnet> <https://www.wired.com/images_blogs/threatlevel/2010/11/w32_stuxnet_dossier.pdf> <http://artemonsecurity.blogspot.de/2017/04/stuxnet-drivers-detailed-analysis.html> <https://storage.googleapis.com/chronicle-research/STUXSHOP%20Stuxnet%20Dials%20In%20.pdf> | |
MITRE ATT&CK | <https://attack.mitre.org/software/S0603/> | |
Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/win.stuxnet> | |
AlienVault OTX | <https://otx.alienvault.com/browse/pulses?q=tag:Stuxnet> |
Last change to this tool card: 30 December 2022
Download this tool card in JSON format
Changed | Name | Country | Observed | ||
APT groups | |||||
Operation Olympic Games | 2007 |
1 group listed (1 APT, 0 other, 0 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |