Stuxnet anatomy virus vimeo


















Most of these viruses are created by regular people like you or me. They are so common, and most of them so badly written that many protection softwares are available to shut them down before they even get the chance to do any real damage. However, some viruses have struck corporations and companies in such a way that they have lost millions of dollars in the attack. But not all viruses are created equal, while some spread like wild fire through videos, e-mails, links, malware, Trojans, etcetera.

Some are actually created to destroy, damage, or spy on computers. The actors infected computers belonging to four outside companies believed to be connected to the Iran nuclear program via malicious Step 7 project files. The infected machines would then spread the malware to the Siemens computers.

The four companies were infected with Stuxnet between June 23 and July 22, ; the companies all noted they had issues with a Siemens Step 7. DLL file. By November, the number further reduced to 3, Once inside the system, Stuxnet found the controlling software for the centrifuges, seized control, and manipulated the speed of the centrifuges. The malware forced the centrifuges to spin very fast for 15 minutes and then return them to normal speed. Within five months of the attack, the excessive speed changes caused the machines to break, resulting in the loss of about 1, centrifuges.

Unfortunately, Stuxnet was unintentionally unleashed in the wild, reportedly, when one of the engineers at an infected facility connected his work laptop to his home network. It infected many more machines than originally intended. Never miss an update. Sign up for a no cost membership today! Receive up-to-date content in our weekly bulletin.

Sign Up. Malware includes computer viruses, computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious or unwanted software , including true viruses. Viruses are sometimes confused with worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan horse is a program that appears harmless but hides malicious functions.

Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to themselves.

Some viruses do nothing beyond reproducing themselves. Leave a comment. Filed under Computers , Society , Video. You are commenting using your WordPress. You are commenting using your Google account. You are commenting using your Twitter account. You are commenting using your Facebook account.



0コメント

  • 1000 / 1000