State Hacks


Stuxnet

  • Alex Gibney on Stuxnet and why we need to talk about cyberwar.  [Engadget]
  • Stuxnet was the opening shot of decades of non-stop cyber warfare.  [The Register]
  • GCHQ intel used to develop Stuxnet, claims new documentary.  [The Register]
  • Super Stuxnet's SCADA slaves: security is atrocious.  [The Register]
  • US tried Stuxnet variant on N. Korean nuke program, failed.  [Ars Technica]  [BoingBoing]  [Reuters]  [The Register]  [Wired]  [Engadget]  [Gizmodo]  [Graham Cluley]  [HardOCP]  [Schneier]
  • Win 95 code gaffe nearly made Stuxnet Suxnet, say infosec blokes.  [The Register]
  • Stuxnet leak probe stalls for fear of confirming US-Israel involvement.  [Ars Technica]
  • Microsoft fixes Stuxnet bug, again.  [Krebs]  [The Register]  [Graham Cluley]  [Engadget]
  • Stuxnet worm infected high-profile targets before hitting Iran nukes.  [Ars Technica]  [Engadget]
    • Iranian contractor named as Stuxnet 'patient zero'.  [The Register]
  • An unprecedented look at Stuxnet, the world’s first digital weapon.  [Wired]  [Gizmodo]  [Symantec]
  • Stuxnet 2 in the works, claims Iranian news agency.  [The Register]
  • Recommended reading: Stuxnet's more dangerous precursor, fake memories and more  [Engadget]
  • More on Stuxnet.  [Schneier]  [Foreign Policy]  [Langner PDF]
    • PDF attached below: Stuxnet - to kill a centrifuge.pdf
  • Stuxnet's earlier version much more powerful.  [Dark Reading]  Gizmodo]  [The Register]  [BoingBoing]  [Foreign Policy]
  • Stuxnet infected Russian nuke power plant.  [The Register]  [The Register]  [Gizmodo]
  • Snowden: US and Israel did create Stuxnet attack code.  [The Register]
  • Former high-ranking US general reportedly being targeted in Stuxnet leak investigation.  [The Verge]  [Ars Technica]  [The Register]
  • Did Stuxnet actually improve Iran's nuclear capabilities?  [WSJ ATD]  [The Register]
  • UN manual on cyberwar says Stuxnet may have been 'armed attack'.  [The Register]
  • Symantec reports early Stuxnet variants first went live in 2005.  [The Register]  [Ars Technica]  [Wired]  [Reuters]  [Voxy]  [Engadget]  [Stuff]  [Schneier]  [Symantec]
  • Iran raised its cyberwar game after Stuxnet, US general says.  [WSJ ATD]
  • Stuxnet infected Chevron's IT network.  [WSJ ATD]
  • Kaspersky plans secure OS to combat Stuxnet.  [Wired]  [Nota Bene]  [Engadget]  [HardOCP]  [Kaspersky]  [THG]
  • Another Stuxnet post.  [Schneier]  [IEEE Spectrum]
  • Stuxnet: moral crime or proportionate response?  [The Register]
  • Stuxnet thwarted by control code update.  [BBC News]
  • A weapon we can't control.  [NYT]
  • Professor casts doubt on Stuxnet's accidental "great escape" theory.  [The Register]
  • NSA built Stuxnet, but real trick is building crew of hackers.  [BoingBoing]  [US News]
  • Flame and Stuxnet link found.  [BBC News]  [Ars Technica]  [The Register]
  • How to put "Stuxnet author" on your CV.  [The Register]
  • Stuxnet expert calls US the "good guys" in cyber-warfare.  [Ars Technica]
  • Stuxnet: US can launch cyberattacks but not defend against them, experts say.  [Huffington Post]
  • US officials confirm Stuxnet was a joint US-Israeli op.  [The Register]  [HardOCP]  [VentureBeat]  [Schneier]  [BoingBoing]  [NYT]
    • Stuxnet admission likely to have foreign policy consequences.  [Ars Technica]
    • Report: Obama ordered Stuxnet to continue after bug caused it to spread wildly.  [Wired]  [Gizmodo]  [Engadget]
      • How Obama was dangerously naive about Stuxnet and cyberwarfare.  [Technology Review]
    • Why antivirus companies like mine failed to catch Flame and Stuxnet.  [Wired]  [Ars Technica]
  • Stuxnet worm reportedly planted by Iranian double agent using memory stick.  [Ars Technica]  [ISSS]
  • Richard Clarke on who was behind the Stuxnet attack.  [Smithsonian]
  • Stuxnet worm revisited by 60 Minutes.  [HardOCP]  [WSJ ATD]  [CBS News]
  • Another piece of the Stuxnet puzzle.  [Schneier]  [Digital Bond]
  • Serious security holes found in Siemens control systems targeted by Stuxnet.  [Ars Technica]  [Wired]
  • Stuxnet clones may target critical US systems, DHS warns.  [The Register]
  • How digital detectives deciphered Stuxnet, the most menacing malware in history.  [Wired]  [Ars Technica]
  • Stuxnet deconsructed shows one scary virus.  [Gizmodo]
  • Iran says it has detected a second cyber attack.  [Reuters]  [Gizmodo]
  • Iran lays blame for Stuxnet worm on Siemens.  [The Register]
  • Iran confirms massive Stuxnet infection of industrial systems.  [ComputerWorld]
  • Is Stuxnet the 'best' malware ever?  [ComputerWorld]
  • Stuxnet malware is 'weapon' out to destroy Iran's Bushehr nuclear plant?  [CS Monitor]
  • Stuxnet false flag launched for web takeover.  [InfoWars]
  • Pentagon accused of launching supervirus attack on Iranian nuclear plant.  [Gizmodo]
  • Mystery lingers over stealthy Stuxnet infection  [The Register]
  • Iranian power plant infected by Stuxnet, allegedly undamaged.  [Ars Technica]
  • Stuxnet worm can reinfect PCs even after disinfection.  [The Register]
  • The secret code inside the supervirus attacking Iran's nuclear power.  [Gizmodo]
  • Stuxnet worm slithers into China, heralds alien invasion.  [The Register]
  • Stuxnet worm could have been inside job.  [V3]
  • Stuxnet Q&A.  [F-Secure]
  • Iran boasts of Stuxnet "nuclear spies" arrests.  [The Register]  [BBC News]
  • Stuxnet.  [Schneier]
  • Stuxnet a game changer for malware defence.  [The Register]
  • Stuxnet heralds new generation of targeted attacks.  [Dark Reading]
  • Clues suggest Stuxnet virus was built for subtle nuclear sabotage.  [Wired]
  • Missing piece completes Stuxnet puzzle.  [The Register]
  • Clues suggest Stuxnet virus was built for subtle nuclear sabotage.  [Ars Technica]
  • Stuxnet attacks could move beyond Iranian nuclear plants.  [Ars Technica]
  • Code clues point to Stuxnet maker.  [BBC News]
  • Stuxnet news.  [Schneier]
  • Stuxnet 'hit' Iran nuclear plans.  [BBC News]
  • Could Stuxnet mess with North Korea's new uranium plant?  [Wired]
  • Stuxnet code leak to cause cyber-apocalypse now!  [The Register]
  • Stuxnet apparently as effective as a military strike.  [Ars Technica]
  • Stuxnet may have destroyed 1000 centrifuges at Natanz.  [Jerusalem Post]
  • Report strengthens suspicions that Stuxnet harmed Iran's nuke plant.  [Ars Technica]
  • Stuxnet worm used against Iran was tested in Israel.  [NYT]  [Schneier]
  • Did a US government lab help Israel develop Stuxnet?  [Wired]
  • Lame Stuxnet worm "full of errors" says security consultant.  [The Register]
  • Duck!  Security experts warn of Stuxnet boomerang effect.  [Gizmodo]
  • Report: Stuxnet hit 5 gateway targets on its way to Iranian plant.  [Wired]
  • Stuxnet blitzed five Iranian factories over 10-month period.  [The Register]
  • Ralph Langner: cracking Stuxnet, a 21st-century cyber weapon.  [TED]
  • Symantec PDF report on Stuxnet (attached below): Symantec-Stuxnet-Update-Feb-2011.pdf

Regin


Mask


Flame

  • Flame Windows Update attack could have been repeated in 3 days, says Microsoft.  [Wired]
  • Flame Q&A.  [Kaspersky]
  • US fingered for Flame attack on Elysee Palace.  [The Register]
  • New spying program linked to Flame authors.  [Stuff]
  • Flame espionage weapon linked to more mystery malware.  [The Register]  [Ars Technica]  [Engadget]  [Reuters]  [SecureList]  [Symantec]
    • Kaspersky: Flame has three unidentified malware siblings.  [THG]
  • Flame worm's makers fail to collect Epic 0wnage award.  [The Register]
  • Microsoft kills more code-signing certs to stop Flame-like attacks.  [Ars Technica]
  • Sometimes it's hard to get rid of an old Flame.  [Juniper]  [SecurityWeek]
  • US accused of using Flame to try to cripple Iran's economy.  [DailyTech]
  • Unique insight into Flame malware.  [OpenDNS Blog]
  • Flame was scout ahead of Stuxnet attack on Iran nukes -- US spooks.  [The Register]
  • Report: US and Israel behind Flame espionage tool.  [Wired]
  • Windows updated with better checking for bad digital certs after Flame malware incident.  [Engadget]
  • Flame's crypto attack may have needed $200k worth of compute power.  [Ars Technica]
  • Flame and Stuxnet link found.  [BBC News]  [Ars Technica]  [The Register]
  • Crypto-breakthrough shows Flame was designed by world-class scientists.  [Ars Technica]
  • Flame gets suicide command.  [The Register]  [HardOCP]  [ZDNet]
  • Flame's "god mode cheat mode" wielded to hijack Windows 7, Server 2008.  [Ars Technica]
  • Flame hijacks Microsoft Update to spread malware disguised as legit code.  [Gizmodo]
  • Flame malware wielded rare "collision" crypto attack against Microsoft.  [Ars Technica]
  • Flame.  [Schneier]
  • Why antivirus companies like mine failed to catch Flame and Stuxnet.  [Wired]  [Ars Technica]
  • Microsoft certification authority signing certificates added to Untrusted Certificate Store.  [Microsoft]
  • 'Super-powerful' Flame work actually boring bloatware.  [The Register]
  • Super-powerful Flame worm could take years to dissect.  [The Register]
  • Meet 'Flame', the massive spy malware infiltrating Iranian computers.  [Wired]
  • Info-stealing malware takes Flame war to new level of cyber weapon.  [ComputerWorld]
  • Global wave of Flame cyber attacks called staggering.  [phys.org]
  • Flame: massive cyber attack discovered, researchers say.  [BBC News]
  • Complex cyberwar tool 'Flame' found all over Middle East.  [The Register]

Related Articles

  • Wired's guide to Russia's infrastructure hacking teams.  [Wired]
  • Russian hackers target the US nuclear industry.  [Engadget]  [HardOCP]  [NYT]
  • Obama reportedly ordered implants to be deployed in key Russian networks.  [Ars Technica]
  • US: North Korea' Hidden Cobra group behind eight years of hacks.  [Stuff]  [Gizmodo]  [Engadget]  [The Register]  [THG]
    • NSA believes North Korea was responsible for WannaCry ransomware attacks.  [The Verge]  [BBC News]  [Schneier]
    • North Korea's sloppy, chaotic cyberattacks also make perfect sense.  [Wired]
    • US-CERT Warns North Korea Has Stepped Up Cyberattacks.  [ExtremeTech]
  • “Crash Override” malware that triggered Ukrainian power outage.  [Ars Technica]  [The Register]  [NZ Herald]  [Stuff]  [HardOCP]  [WeLiveSecurity]  [Dragos]
    • Watch hackers take over the mouse of a power-grid computer.  [Wired]
  • Where Russian spies hide their control servers.  [Ars Technica]
  • North Korean cyberwar capabilities.  [Schneier]  [Reuters]  [NZ Herald]  [Stuff]
  • We are not done with state-sponsored hacking.  [Russ White]  [Monday Note]
  • Criminals getting closer to state actors.  [Russ White]  [Halbheer]
  • Attack vs defense in nation-state cyber operations.  [Schneier]  [Cornell]
  • Malware 'disguised as Siemens firmware drills into 10 industrial plants'.  [The Register]
  • The US has been conducting offensive cyberattacks against North Korea.  [Schneier]  [NYT]
  • Duqu malware techniques used by cybercriminals.  [Schneier]  [SecureList]  [Ars Technica]
  • Definitely not another Stuxnet, researchers claim as they demo industrial control rootkit.  [The Register]
  • Yet another government-sponsored malware.  [Schneier]
  • Stuxnet-like "Irongate" malware discovered.  [Schneier]  [FireEye]  [Motherboard]  [Dark Reading]
  • Air-gapping SCADA systems won't help you, says man who knows.  [The Register]
  • Inside the unprecedented hack of Ukraine’s power grid.  [Wired]
  • Massive US-planned "Nitro Zeus" cyberattack against Iran went well beyond Stuxnet.  [Ars Technica]
    • 'Nitro Zeus' was a massive cyber attack plan aimed at Iran if nuclear negotiations failed: report.  [Jalopnik]
  • Kaspersky Lab reveals Duqu 2.0 attack on itself during Iran nuke talks.  [The Register]  [THG]  [Wired]  [Graham Cluley]  [HardOCP]  [BBC News]  [Schneier]
    • Duqu 2.0: 'Terminator' malware that pwned Kaspersky could have come from Israel.  [The Register]
    • Duqu 2.0‬ malware buried into Windows PCs using 'stolen Foxconn certs'.  [The Register]  [Ars Technica]  [Wired]
  • A cyberattack has caused confirmed physical damage for the second time ever.  [Wired]  [Gizmodo]  [Schneier]
  • Active malware operation let attackers sabotage US energy industry.  [Ars Technica]  [Gizmodo]  [Symantec]
    • Dragonfly hackers target 1000 Western energy firms, industrial control systems.  [Graham Cluley]  [DailyTech]
  • Attackers fling Stuxnet-style RATs at critical control software in Europe.  [The Register]
  • New cyber-attack model helps predict timing of the next Stuxnet.  [Ars Technica]
  • SCADA security is better and worse than we think.  [The Register]
  • Decade-old espionage malware found targeting government computers.  [Ars Technica]  [ThreatPost]
  • SCADA honeypots attract swarm of international hackers.  [The Register]
  • Gauss.  [Schneier]  [Ars Technica]
  • Eugene Kaspersky and Mikko Hypponen talk Red October and the future of cyber warfare.  [TechCrunch]
  • 'Red October' cyber attack found by Russian researchers.  [BBC News]  [Gizmodo]  [Kaspersky]  [TrustedReviews]  [THG]
  • Iranian computers targeted by new malicious data wiper program.  [Ars Technica]  [WSJ ATD]
    • Iran responds to new "Stuxnet-like" cyber attack.  [WSJ ATD]  [HardOCP]  [AP]
  • Malware spy network targeted Israelis, Palestinians.  [Krebs]
  • A Stuxnet future?  Yes, offensive cyber-warfare is already here.  [ISN]
  • DDoS attacks on major US banks are no Stuxnet -- here's why.  [Ars Technica]
  • More malware targeting Iran could yet be discovered.  [BBC News]
  • The perfect crime: is Wiper malware connected to Stuxnet, Duqu?  [Ars Technica]  [Wired]
  • New virus linked to Stuxnet found.  [HardOCP]  [STL Today]  [Ars Technica]  [Wired]
  • Siemens squashes Stuxnet-like bugs in SCADA kit.  [The Register]
  • New Mahdi strain of spyware targets Iran and Israel.  [ReadWriteWeb]
    • Move over, Flame: new Messiah-themed malware targets Iran and Israel.  [Ars Technica]
  • The failure of anti-virus companies to catch military malware.  [Schneier]  [Wired]  [The Register]
  • Stuxnet expert calls US the "good guys" in cyber-warfare.  [Ars Technica]
  • Stuxnet ≠ cyberwar, says US Army cyber command officer.  [The Register]
  • Researchers show how easy a new Stuxnet-like attack can be.  [WSJ ATD]
  • There's a new version of the Stuxnet-esque Duqu trojan floating around and nobody knows what it does.  [Gizmodo]
  • Duqu trojan used 'unknown' programming language: Kaspersky.  [CBR]
    • Duqu mystery language solved with the help of crowdsourcing.  [Wired]
  • A Valentine's Day present for SCADA companies: new exploit tools.  [Ars Technica]
  • Stuxnet weapon has at least 4 cousins: researchers.  [Reuters]
  • From the man who discovered Stuxnet, dire warnings one year later.  [CS Monitor]
  • US reveals Stuxnet-style vuln in Chinese SCADA 'ware.  [The Register]
  • Kaspersky claims 'smoking code' linking Stuxnet and Duqu.  [The Register]
  • Microsoft squashes Duqu threat with Windows patch.  [Ars Technica]
  • Microsoft airs temporary fix to defeat Duqu worm.  [DailyTech]
  • Nasty 'Duqu' worm exploits same Microsoft Office bug as Stuxnet.  [DailyTech]  [Ars Technica]
  • Researchers warn of new Stuxnet worm.  [BBC News]
  • New malware: Duqu.  [Schneier]
  • Son of Stuxnet discovered.  [The Register]  [Wired]

Ċ
Robert Larsen,
4 Jan 2012, 13:57