On June 24, with little fanfare, Stuxnet died. The malware exposed as being a government project aimed at slowing Iran’s nuclear intiatives, stopped replicating. Despite a reported link to a plant shutdown in Iran, the state run media called Stuxnet a failure.
“Stuxnet’s mission was to destroy centrifuges, then itself. It is programmed to terminate June 24, 2012 – seven years to the day after Iranian President Mahmoud Ahmadinejad was elected president – a matter likely viewed by the Bush Administration with trepidation given his resolve on nuclear matters. If Stuxnet had succeeded, Iran might be out of the nuclear fuel refining game. It’s not. So, is Iran rightly concerned about further cyber intrusions?” the FARS News Agency pondered.
Stuxnet is a project that allegedly started during the Bush Administration, and carried over to the Obama Administration. Based on research, the code itself was designed to do the job and go away. As it turned out, Stuxnet was only one of three programs that show signs of coming from the same development group. Flame and Duqu (discovered after Stuxnet, but developed before and shortly after respectively) also targeted Iran – and media reports link them to the U.S. as well.
Stuxnet was programmed to stop replicating on June 24, and when the larger story of the government’s malware program is examined, the date “probably [indicates] that the attackers were planning to have it long updated by June 1st, 2011 and retired or replaced by June 24th, 2012,” Kaspersky Lab’s Costin Raiu wrote.
It isn’t unheard of for malware authors to include removal commands or kill switches. Duqu had a lifespan of just 30-days, and shortly after it’s discovery the controllers of Flame issued a kill command in an effort to remove all traces of its existence.
“We don’t see [planned shutdowns] very often in threats, it’s very unusual,” Liam O Murchu, manager of operations for Symantec Security Response told GCN in an interview.
More from Steve Ragan
- Anonymous Claims Attack on IP Surveillance Firm Brickcom, Leaks Customer Data
- Workers Don’t Trust Employers with Personal Data: Survey
- Root SSH Key Compromised in Emergency Alerting Systems
- Morningstar Data Breach Impacted 184,000 Clients
- Microsoft to Patch Seven Flaws in July’s Patch Tuesday
- OpenX Addresses New Security Flaws with Latest Update
- Ubisoft Breached: Users Urged to Change Passwords
- Anonymous Targets Anti-Anonymity B2B Firm Relead.com
Latest News
- Critical Vulnerability Impacts Over 120 Lexmark Printers
- BIND Updates Patch High-Severity, Remotely Exploitable DoS Flaws
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
- Microsoft Urges Customers to Patch Exchange Servers
- Iranian APT Leaks Data From Saudi Arabia Government Under New Persona
- US Reiterates $10 Million Reward Offer After Disruption of Hive Ransomware
- Cyberattacks Target Websites of German Airports, Admin
- US Infiltrates Big Ransomware Gang: ‘We Hacked the Hackers’
