State Hacks


Stuxnet

  • Israel silent as Iran hit by computer virus more violent than Stuxnet.  [The Times of Israel]  [Ars Technica]
  • Alex Gibney on Stuxnet and why we need to talk about cyberwar.  [Engadget]
  • Stuxnet was the opening shot of decades of non-stop cyber warfare.  [The Register]
  • GCHQ intel used to develop Stuxnet, claims new documentary.  [The Register]
  • Super Stuxnet's SCADA slaves: security is atrocious.  [The Register]
  • US tried Stuxnet variant on N. Korean nuke program, failed.  [Ars Technica]  [BoingBoing]  [Reuters]  [The Register]  [Wired]  [Engadget]  [Gizmodo]  [Graham Cluley]  [HardOCP]  [Schneier]
  • Win 95 code gaffe nearly made Stuxnet Suxnet, say infosec blokes.  [The Register]
  • Stuxnet leak probe stalls for fear of confirming US-Israel involvement.  [Ars Technica]
  • Microsoft fixes Stuxnet bug, again.  [Krebs]  [The Register]  [Graham Cluley]  [Engadget]
  • Stuxnet worm infected high-profile targets before hitting Iran nukes.  [Ars Technica]  [Engadget]
    • Iranian contractor named as Stuxnet 'patient zero'.  [The Register]
  • An unprecedented look at Stuxnet, the world’s first digital weapon.  [Wired]  [Gizmodo]  [Symantec]
  • Stuxnet 2 in the works, claims Iranian news agency.  [The Register]
  • Recommended reading: Stuxnet's more dangerous precursor, fake memories and more  [Engadget]
  • More on Stuxnet.  [Schneier]  [Foreign Policy]  [Langner PDF]
    • PDF attached below: Stuxnet - to kill a centrifuge.pdf
  • Stuxnet's earlier version much more powerful.  [Dark Reading]  Gizmodo]  [The Register]  [BoingBoing]  [Foreign Policy]
  • Stuxnet infected Russian nuke power plant.  [The Register]  [The Register]  [Gizmodo]
  • Snowden: US and Israel did create Stuxnet attack code.  [The Register]
  • Former high-ranking US general reportedly being targeted in Stuxnet leak investigation.  [The Verge]  [Ars Technica]  [The Register]
  • Did Stuxnet actually improve Iran's nuclear capabilities?  [WSJ ATD]  [The Register]
  • UN manual on cyberwar says Stuxnet may have been 'armed attack'.  [The Register]
  • Symantec reports early Stuxnet variants first went live in 2005.  [The Register]  [Ars Technica]  [Wired]  [Reuters]  [Voxy]  [Engadget]  [Stuff]  [Schneier]  [Symantec]
  • Iran raised its cyberwar game after Stuxnet, US general says.  [WSJ ATD]
  • Stuxnet infected Chevron's IT network.  [WSJ ATD]
  • Kaspersky plans secure OS to combat Stuxnet.  [Wired]  [Nota Bene]  [Engadget]  [HardOCP]  [Kaspersky]  [THG]
  • Another Stuxnet post.  [Schneier]  [IEEE Spectrum]
  • Stuxnet: moral crime or proportionate response?  [The Register]
  • Stuxnet thwarted by control code update.  [BBC News]
  • A weapon we can't control.  [NYT]
  • Professor casts doubt on Stuxnet's accidental "great escape" theory.  [The Register]
  • NSA built Stuxnet, but real trick is building crew of hackers.  [BoingBoing]  [US News]
  • Flame and Stuxnet link found.  [BBC News]  [Ars Technica]  [The Register]
  • How to put "Stuxnet author" on your CV.  [The Register]
  • Stuxnet expert calls US the "good guys" in cyber-warfare.  [Ars Technica]
  • Stuxnet: US can launch cyberattacks but not defend against them, experts say.  [Huffington Post]
  • US officials confirm Stuxnet was a joint US-Israeli op.  [The Register]  [HardOCP]  [VentureBeat]  [Schneier]  [BoingBoing]  [NYT]
    • Stuxnet admission likely to have foreign policy consequences.  [Ars Technica]
    • Report: Obama ordered Stuxnet to continue after bug caused it to spread wildly.  [Wired]  [Gizmodo]  [Engadget]
      • How Obama was dangerously naive about Stuxnet and cyberwarfare.  [Technology Review]
    • Why antivirus companies like mine failed to catch Flame and Stuxnet.  [Wired]  [Ars Technica]
  • Stuxnet worm reportedly planted by Iranian double agent using memory stick.  [Ars Technica]  [ISSS]
  • Richard Clarke on who was behind the Stuxnet attack.  [Smithsonian]
  • Stuxnet worm revisited by 60 Minutes.  [HardOCP]  [WSJ ATD]  [CBS News]
  • Another piece of the Stuxnet puzzle.  [Schneier]  [Digital Bond]
  • Serious security holes found in Siemens control systems targeted by Stuxnet.  [Ars Technica]  [Wired]
  • Stuxnet clones may target critical US systems, DHS warns.  [The Register]
  • How digital detectives deciphered Stuxnet, the most menacing malware in history.  [Wired]  [Ars Technica]
  • Stuxnet deconsructed shows one scary virus.  [Gizmodo]
  • Iran says it has detected a second cyber attack.  [Reuters]  [Gizmodo]
  • Iran lays blame for Stuxnet worm on Siemens.  [The Register]
  • Iran confirms massive Stuxnet infection of industrial systems.  [ComputerWorld]
  • Is Stuxnet the 'best' malware ever?  [ComputerWorld]
  • Stuxnet malware is 'weapon' out to destroy Iran's Bushehr nuclear plant?  [CS Monitor]
  • Stuxnet false flag launched for web takeover.  [InfoWars]
  • Pentagon accused of launching supervirus attack on Iranian nuclear plant.  [Gizmodo]
  • Mystery lingers over stealthy Stuxnet infection  [The Register]
  • Iranian power plant infected by Stuxnet, allegedly undamaged.  [Ars Technica]
  • Stuxnet worm can reinfect PCs even after disinfection.  [The Register]
  • The secret code inside the supervirus attacking Iran's nuclear power.  [Gizmodo]
  • Stuxnet worm slithers into China, heralds alien invasion.  [The Register]
  • Stuxnet worm could have been inside job.  [V3]
  • Stuxnet Q&A.  [F-Secure]
  • Iran boasts of Stuxnet "nuclear spies" arrests.  [The Register]  [BBC News]
  • Stuxnet.  [Schneier]
  • Stuxnet a game changer for malware defence.  [The Register]
  • Stuxnet heralds new generation of targeted attacks.  [Dark Reading]
  • Clues suggest Stuxnet virus was built for subtle nuclear sabotage.  [Wired]
  • Missing piece completes Stuxnet puzzle.  [The Register]
  • Clues suggest Stuxnet virus was built for subtle nuclear sabotage.  [Ars Technica]
  • Stuxnet attacks could move beyond Iranian nuclear plants.  [Ars Technica]
  • Code clues point to Stuxnet maker.  [BBC News]
  • Stuxnet news.  [Schneier]
  • Stuxnet 'hit' Iran nuclear plans.  [BBC News]
  • Could Stuxnet mess with North Korea's new uranium plant?  [Wired]
  • Stuxnet code leak to cause cyber-apocalypse now!  [The Register]
  • Stuxnet apparently as effective as a military strike.  [Ars Technica]
  • Stuxnet may have destroyed 1000 centrifuges at Natanz.  [Jerusalem Post]
  • Report strengthens suspicions that Stuxnet harmed Iran's nuke plant.  [Ars Technica]
  • Stuxnet worm used against Iran was tested in Israel.  [NYT]  [Schneier]
  • Did a US government lab help Israel develop Stuxnet?  [Wired]
  • Lame Stuxnet worm "full of errors" says security consultant.  [The Register]
  • Duck!  Security experts warn of Stuxnet boomerang effect.  [Gizmodo]
  • Report: Stuxnet hit 5 gateway targets on its way to Iranian plant.  [Wired]
  • Stuxnet blitzed five Iranian factories over 10-month period.  [The Register]
  • Ralph Langner: cracking Stuxnet, a 21st-century cyber weapon.  [TED]
  • Symantec PDF report on Stuxnet (attached below): Symantec-Stuxnet-Update-Feb-2011.pdf

Regin


Mask


Flame

  • Flame Windows Update attack could have been repeated in 3 days, says Microsoft.  [Wired]
  • Flame Q&A.  [Kaspersky]
  • US fingered for Flame attack on Elysee Palace.  [The Register]
  • New spying program linked to Flame authors.  [Stuff]
  • Flame espionage weapon linked to more mystery malware.  [The Register]  [Ars Technica]  [Engadget]  [Reuters]  [SecureList]  [Symantec]
    • Kaspersky: Flame has three unidentified malware siblings.  [THG]
  • Flame worm's makers fail to collect Epic 0wnage award.  [The Register]
  • Microsoft kills more code-signing certs to stop Flame-like attacks.  [Ars Technica]
  • Sometimes it's hard to get rid of an old Flame.  [Juniper]  [SecurityWeek]
  • US accused of using Flame to try to cripple Iran's economy.  [DailyTech]
  • Unique insight into Flame malware.  [OpenDNS Blog]
  • Flame was scout ahead of Stuxnet attack on Iran nukes -- US spooks.  [The Register]
  • Report: US and Israel behind Flame espionage tool.  [Wired]
  • Windows updated with better checking for bad digital certs after Flame malware incident.  [Engadget]
  • Flame's crypto attack may have needed $200k worth of compute power.  [Ars Technica]
  • Flame and Stuxnet link found.  [BBC News]  [Ars Technica]  [The Register]
  • Crypto-breakthrough shows Flame was designed by world-class scientists.  [Ars Technica]
  • Flame gets suicide command.  [The Register]  [HardOCP]  [ZDNet]
  • Flame's "god mode cheat mode" wielded to hijack Windows 7, Server 2008.  [Ars Technica]
  • Flame hijacks Microsoft Update to spread malware disguised as legit code.  [Gizmodo]
  • Flame malware wielded rare "collision" crypto attack against Microsoft.  [Ars Technica]
  • Flame.  [Schneier]
  • Why antivirus companies like mine failed to catch Flame and Stuxnet.  [Wired]  [Ars Technica]
  • Microsoft certification authority signing certificates added to Untrusted Certificate Store.  [Microsoft]
  • 'Super-powerful' Flame work actually boring bloatware.  [The Register]
  • Super-powerful Flame worm could take years to dissect.  [The Register]
  • Meet 'Flame', the massive spy malware infiltrating Iranian computers.  [Wired]
  • Info-stealing malware takes Flame war to new level of cyber weapon.  [ComputerWorld]
  • Global wave of Flame cyber attacks called staggering.  [phys.org]
  • Flame: massive cyber attack discovered, researchers say.  [BBC News]
  • Complex cyberwar tool 'Flame' found all over Middle East.  [The Register]

Related / Useful Articles


Ċ
Robert Larsen,
4 Jan 2012, 13:57