Wired Unpacks Stuxnet Mystery

You might think that everything that needs to be written on Stuxnet already has. After all, Threatpost has spilled (virtual) column inches on the stealthy worm, which targeted Siemens Simatic S7 programmable logic controllers. That’s in addition to posts by the likes of Symantec, McAfee and the mainstream media. But there’s still a story behind the story that hasn’t been told….until now.

You might think that everything that needs to be written on Stuxnet already has. After all, Threatpost has spilled (virtual) column inches on the stealthy worm, which targeted Siemens Simatic S7 programmable logic controllers. That’s in addition to posts by the likes of Symantec, McAfee and the mainstream media. But there’s still a story behind the story that hasn’t been told….until now.

Wired.com’s Kim Zetter is taking a swing at telling the inside story behind the discovery and analysis of Stuxnet in a major, new feature on Threatlevel, Wired’s security blog. Zetter, a seasoned reporter who provided some of the best contemporaneous coverage of the Stuxnet outbreak, rolls the timeline back: looking at the earliest evidence of an outbreak – a suspiciously high number of disabled centrifuges at Iran’s Natanz nuclear plant, to the discovery of the virus by virus researcher Sergey Ulasen at Belarusian AV firm VirusBlokAda and the subsequent technical analysis of the worm by firms such as Symantec. Along the way, Zetter speaks to pretty much every major researcher who rolled up his sleeves on Stuxnet: Liam O’Murchu, Nicolas Falliere and Eric Chien at Symantec, German researcher Ralph Langer and others.

If you think you know everything there is to know about Stuxnet, Zetter’s piece is still worth a read. Check it out

Suggested articles