Before It’s News – by Lyn Leahz
Someone snuck into the Nuclear Plant with a portable USB device, smuggled it in, and infected the entire plant. An infection has therefore been spread through the ISS.
YouTube Desc:
The speech is long, but they tell a lot! Looks like the US is Busted on this, almost on purpose! They have un trackable tools, so for this to be Stuxnet smells rotten!
A quote from MotherBoard Beta News states:
Good news, patriots: One of America’s finest may again be heading into the final frontier. But this time it’s Stuxnet, the malware worm that the US and Israel designed to cripple Iran’s nuclear program. Both a 2012 report from The New York Times and recent revelations from Edward Snowden all but confirmed that the US was behind the virus—and has lost control of it. The malware is now evidently attacking nuke plants as far away as Russia and climbing aboard the International Space Station.
Stuxnet proliferates indiscriminately, but harbors malware designed to infect the industrial control hardware of nuclear power plants. As Ars Technica explains, “The goal of the worm was to break Iranian nuclear centrifuge equipment … By doing so, both governments hoped to set back the Iranian research program—and the US hoped to keep Israel from launching a pre-emptive military attack.”
It wasn’t supposed to spread beyond Iran’s nascent nuke plants, but of course it did. Traipsing across the globe like any good epidemic, Stuxnet has now surfaced all the way across the continent. Speaking at the Canberra Press Club 2013 in Australia, renowned IT specialistEugeney Kaspersky claimed that Stuxnet had infiltrated a plant in Russia.
Other links:
This is serious business, folks. If you haven’t been praying, you need to start; and if you are praying, pray harder!
And a few days earlier:
YouTube Desc:
A speech by Eugene Kaspersky at the Press Club in Canberra, Australia. The borad talk was designed to bring non-tech journos up to speed on infosec issues.
In it, he said a engineer friend told him Stuxnet had ‘badly infected’ the internal network of a Russian nuclear plant after the sophisticated malware caused chaos in Iran’s nuclear facilities in Natanz .
The malware, widely considered to have been developed by the US Government as a means to disrupt Iran’s nuclear enrichment plans, had crossed a physically separated ‘air-gapped’ network in the Russian plant after it was carried across on a USB device.
Are they all set to go with the grid blackout “exercise” planned for just a few days from now?
. . .
WWlll cyber war commencing?