[Article] Full-text Friday - 'How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History'
Welcome to the inaugural week of Full-text Friday, where I'll share a quality article/blog/longread that I've found particularly fascinating, well-written, and worth reading for discussion in this community. These posts will be generally be data/technology related, but don't hold me liable to that 😀
This week's read details the story of Stuxnet, a (brilliant and terrifying) piece of malware which precisely targeted certain highly-specific models of Siemens programmable logic controllers. These PLCs just so happened to control Iranian nuclear centrifuges being used for uranium enrichment in Iran's nuclear development program.
Stuxnet, allegedly co-written by the U.S. and Israel (good luck getting confirmation on that), infected Iran's air-gapped (!!) centrifuge controllers, causing catastrophic damage to their centrifuges and resulting a major setback to their weapons program. It also marks one of the earliest instances of successful international cyberwarfare (like I said, terrifying).
Check out the article for a gripping read (seriously, if you're into this stuff, this article is incredible) - this is one that we'll watch movies about someday, folks.
How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History - by Kim Zetter