Did Ex-General Leak Stuxnet Info To The Media?

By Robert Vamosi | 6/28/13 3:27 AM

NBC news is reporting that a former Pentagon general may have leaked information about the creation of the Stuxnet malware to the media.

In a report, NBC names Retired Marine Gen. James “Hoss” Cartwright, the former vice chairman of the Joint Chiefs of Staff, as the target of a Justice Department investigation. NBC notes that "Gen. Cartwright, 63, becomes the latest individual targeted over alleged leaks by the Obama administration, which has already prosecuted or charged eight individuals under the Espionage Act." Cartwright was "a four-star general who was vice chairman of the Joint Chiefs from 2007 to 2011, conceived and ran the cyber operation, called Olympic Games, under Presidents Bush and Obama."

Read More >

Early Stuxnet Variant Discovered

By Robert Vamosi | 2/26/13 7:16 AM

In his keynote speech this morning at the RSA Conference 2013, Francis deSouza, president of products and security systems at Symantec, announced that his company had found a missing piece to the Stuxnet mystery: prior existence of the malware.

Read More >

Stuxnet Attacks Iran -- Again

By Robert Vamosi | 1/2/13 2:15 AM

The Iranian news media reports that its Hormozgan province has been attacked by Stuxnet, malware that first attacked the Iranian nuclear energy sector in 2010.

Read More >

Batchwiper Follows Stuxnet/Flame Onto Iranian Computers

By Robert Vamosi | 12/18/12 2:35 AM

A new data wiping malware is targeting Iranian computers networks, according to an alert from that country's Computer Emergency Response Team.

Known as Batchwiper, because the destructive element is found within a batch file, the malware systematically wipes data found on Windows-based drives with letters D through I. AlienVault has detailed analysis of Batchwiper's installation and payload.

Read More >

Chevron Also Hit With Stuxnet In 2010

By Robert Vamosi | 11/12/12 1:58 AM

Chevron is the first US company to acknowledge being hit with the Stuxnet malware.

Last Thursday, the Wall Street Journal reported that Chevron found the virus in July 2010, shortly after it was made public with infections in the middle east. The Journal said the malware "appears to be the result of the unintentional (and perhaps, inevitable) release of malware upon a larger network, much like an experimental virus escaping from a medical lab."

Read More >

Researcher: Wiper Malware Related to Stuxnet, Duqu

By Robert Vamosi | 8/30/12 2:19 AM

Clues connecting malware that wipes a hard drive clean to state-sponsored malware have emerged.

Read More >

New Stuxnet / Flame Relative Targets Middle East Banks

By Robert Vamosi | 8/10/12 2:52 AM

A new malware that targets banks in the Middle East has its origins in code used for Stuxnet and Flame, say researchers.

Read More >

Siemens Patches Last Of Stuxnet Flaws

By Robert Vamosi | 7/30/12 5:04 AM

In the summer of 2010, the Stuxnet malware made history by attack physical hardware. Nearly two years later, the vendor, Siemens, has announced the last of the patches to ward off future Stuxnet-like attacks.

Read More >

Researchers: Flame and Stuxnet Share Common Code

By Robert Vamosi | 6/11/12 6:26 AM

Stuxnet appears to have been based on the Flame malware, researchers now say.

Read More >

Podcast: James Burns On Stuxnet's Ability To Deceive Reality

By Robert Vamosi | 6/1/12 3:40 AM

In this week's re-broadcast of an earlier DeviceLine podcast, Mocana’s senior analyst Robert Vamosi and senior solutions architect James Burns talk about how Stuxnet attempts to deceive the abstraction layer for software execution and about hacking unencrypted satellite signals.

The DeviceLine podcast can be heard here.

Read More >
COMMENTS