- published: 09 Jun 2011
- views: 574464
Stuxnet is a malicious computer worm believed to be a jointly built American-Israeli cyber weapon. Although neither state has confirmed this openly, anonymous US officials speaking to the Washington Post claimed the worm was developed during the Obama administration to sabotage Iran’s nuclear program with what would seem like a long series of unfortunate accidents.
Stuxnet specifically targets PLCs, which allow the automation of electromechanical processes such as those used to control machinery on factory assembly lines, amusement rides, or centrifuges for separating nuclear material. Exploiting four zero-day flaws, Stuxnet functions by targeting machines using the Microsoft Windows operating system and networks, then seeking out Siemens Step7 software. Stuxnet reportedly compromised Iranian PLCs, collecting information on industrial systems and causing the fast-spinning centrifuges to tear themselves apart. Stuxnet’s design and architecture are not domain-specific and it could be tailored as a platform for attacking modern SCADA and PLC systems (e.g., in automobile or power plants), the majority of which reside in Europe, Japan and the US. Stuxnet reportedly ruined almost one-fifth of Iran's nuclear centrifuges.
Zero Days is a 2016 American documentary film directed by Alex Gibney. It was selected to compete for the Golden Bear at the 66th Berlin International Film Festival.
Zero Days covers the phenomenon surrounding the Stuxnet computer virus and the development of the malware software known as "Olympic Games".
Subscribe for more Hungry Beast: http://bit.ly/HungryBeast In June last year, a computer virus called Stuxnet was discovered lurking in the data banks of power plants, traffic control systems and factories around the world. Pandora's box has been opened; on the new battlefield the aggressors are anonymous, the shots are fired without starting wars and the foot soldiers can pull their triggers without leaving their desks. Last week the United States government announced they would retaliate to a cyber-attack with conventional force. The threat is real, and the age in which a computer bug could cost lives has begun. For more Hungry Beast, check out our Playlists: Beast Files: http://bit.ly/BeastFiles-HungryBeast Sex: http://bit.ly/Sex-HungryBeast Breaking The Law: http://bit.ly/Breakin...
The story of an attack on Iran's nuclear program and the hack that will cripple Iran.
http://www.ted.com When first discovered in 2010, the Stuxnet computer worm posed a baffling puzzle. Beyond its unusually high level of sophistication loomed a more troubling mystery: its purpose. Ralph Langner and team helped crack the code that revealed this digital warhead's final target -- and its covert origins. In a fascinating look inside cyber-forensics, he explains how. TEDTalks is a daily video podcast of the best talks and performances from the TED Conference, where the world's leading thinkers and doers give the talk of their lives in 18 minutes. Featured speakers have included Al Gore on climate change, Philippe Starck on design, Jill Bolte Taylor on observing her own stroke, Nicholas Negroponte on One Laptop per Child, Jane Goodall on chimpanzees, Bill Gates on malaria and m...
The Stuxnet computer worm is perhaps the most complicated piece of malicious software ever built; roughly 50 times the size of the typical computer virus. It leveraged an array of new techniques to spread and conceal itself while attacking Iranian nuclear enrichment centrifuges. Symantec Chief Architect Carey Nachenberg explains how the Stuxnet worm spread, evaded detection and ultimately accomplished its mission. Stanford University: http://www.stanford.edu/ Center for International Security and Cooperation: http://cisac.stanford.edu/ Stanford University Channel on YouTube: http://www.youtube.com/stanford
Zero Days Official Trailer 1 (2016) - Stuxnet Virus Documentary HD Subscribe to INDIE & FILM FESTIVALS: http://bit.ly/1wbkfYg Subscribe to TRAILERS: http://bit.ly/sxaw6h Subscribe to COMING SOON: http://bit.ly/H2vZUn Like us on FACEBOOK: http://bit.ly/1QyRMsE Follow us on TWITTER: http://bit.ly/1ghOWmt Documentary detailing claims of American/Israeli jointly developed malware Stuxnet being deployed not only to destroy Iranian enrichment centrifuges but also threaten attacks against Iranian civilian infrastructure. Adresses obvious potential blowback of this possibly being deployed against the US by Iran in retaliation. You're quite the artsy one, aren't you? Fandango MOVIECLIPS FILM FESTIVALS & INDIE TRAILERS is the destination for...well, all things related to Film Festivals & Indie Fil...
This demonstration video takes a detailed look at the Stuxnet worm on a Siemens PCS7 FieldPG host. The demo provides a brief overview of the worm, and then takes a look at how it exploits Windows vulnerabilities to install itself on the target host, infect various Windows and Siemens components, and then replicate itself for installation on other hosts. Additional information available at http://www.SCADAhacker.com/stuxnet
Join me on Facebook https://www.facebook.com/Sentientmind Protected under the Creative Commons License for re-use. All credit goes to: Direction and Motion Graphics: Patrick Clair Written by: Scott Mitchell
3D animated video created for Symantec. A HUD style video showing how the Stuxnet virus has effected a nuclear enrichment plant. Created using Adobe After Effects, Maya, Cinema 4D and and Premiere.
This short documentary shows how the Iranian nuclear program was ruined using "Creative Non-Violence".
Ralph Langner provides the most detailed presentation of the Stuxnet S7 code. He goes through the key Function Codes and Data Blocks in detail and shows how it matches to the Natanz facility. You see Ralph's teams comments throughout the Stuxnet code, and the level of detailed analysis. This performance from S4x12 is a great example of the technical detail we look for in a Stage 2: Technical Deep Dive Session. The beauty of Ralph's presentation is he also makes the key points understandable for a less technical viewer. This video from S4x12 was viewed 38K times on Vimeo before we moved it to this YouTube Channel.
"The potential for enormous destruction and loss of life is palpable when it comes to cyberweapons," says Alex Gibney, director of the new film Zero Days, which delves into the creation, deployment, and implications of the Stuxnet virus. Stuxnet, a self-replicating cyberweapon launched by the U.S. and Israel into the Natanz nuclear plant in Iran, was an effort to thwart Iran's nuclear progress by taking control of the plant's centrifuges, spinning them until they would explode. "The reason it is hugely significant is it is the first time a computer code has crossed the threshold from the realm of cyber to the realm of the physical. So it is blowing stuff up." "It was a brilliant and elegant weapon which achieved a goal of slowing down Iran's path to being a nuclear power. However, as a pr...
Lawrence Husick Senior Fellow · The 17th largest country in the world, the Islamic Republic of Iran commands attention not just because of its burgeoning nuclear program but because of its many roles in world affairs -- as the most important state sponsor of terrorism, as leader of the "rejectionist front" vis-à-vis the Israel-Palestine conflict, as the inspiration for radical Islam elsewhere in the Muslim world. There is also the matter of its suppression of the Green Movement in 2009 and ever since. In this intensive weekend-long conference for high school teachers, we looked at Iran in its larger historical, cultural, and geopolitical context, with lectures by the best scholars in the country.
The Stuxnet virus does actual physical damage to nuclear systems in Iran
Abstract There has been many publications on the topic of Stuxnet and its "sophistication" in the mainstream press. However, there is not a complete publication which explains all of the technical vulnerability details and how they were discovered. In this talk, you will get a first-hand account of the entire story. Description We will discuss various techniques used in analyzing Stuxnet. First, we will share several tricks that were used to quickly identify the vulnerabilities. Second, we describe the thought processes that went into debugging and triaging the vulnerabilities themselves. Finally, we show some tips that you can use if you feel like decompiling stuff for fun :).
In the recent Cybercrimes show with Ben Hammersley, Eugene Kaspersky spoke about the dangers the Stuxnet worm possesses and what malware like this has the potential to do. View more: http://www.bbc.co.uk/programmes/b04p2l66
Whistleblower testimonies from multiple agents within both the CIA and NSA about Stuxnet. It was a massive multinational interagency operation which included; NSA, CIA, USMil CyberCommand, GCHQ, Mossad and Unit 8200. The real name of Stuxnet was Olympic Games and entire operation is called Nitro Zeus. cc: @ZeroDaysFilm mirror: https://vimeo.com/174571217