Six Hundred Kilobytes of War 2.0
The first cyber smart bomb has been delivered, and researchers are still trying to figure out who did it, and even what the target was.
Stuxnet may be getting lots of attention in the news over the last week, but what is most interesting about this cyber smart bomb is that the payload expected to finish the job by January 2010 - meaning whatever got hit was hit months ago.
I rarely get the opportunity to discuss cyber security on the blog - contractually I must get approval to blog such discussions. In most cases I simply ignore the topic and let someone else do it better than I anyway, but in the case of Stuxnet we cannot ignore what has happened on ID.
For technical professionals I encourage you to monitor Symantec for updates and revelations regarding Stuxnet.
I personally hope that Liam O’Murchu publishes his paper on the worm for public consumption while responsibly withholding certain details.
Stuxnet is a game changer for cyber warfare for many reasons, but one reason we must not ignore is that Stuxnet represents the first seriously dangerous piece of malware to be openly disseminated and discussed in the context of a state level cyber smart bomb.
For those who want to be caught up to speed, here is a brief recap.
…