back to article Lame Stuxnet worm 'full of errors', says security consultant

Far from being cyber-spy geniuses with ninja-like black-hat coding skills, the developers of Stuxnet made a number of mistakes that exposed their malware to earlier detection and meant the worm spread more widely than intended. Stuxnet, the infamous worm that infected SCADA-based computer control systems, is sometimes …

COMMENTS

This topic is closed for new posts.

Page:

  1. jccampb

    terminology

    I understand that now we have legitimized screwing up other people's computers in the "cyber warfare" context but when there is any possibility that the malware creator is some private sector "Cracker" then they need to be described in proper concept, not romanticized. Sic: "the Daring burglar". If the same twit physically snuck into your own personal bedroom at night and just pulled all your wife's underwear out of the drawer to "let you know he'd been there." you wouldn't describe his behavior as "daring" would you?

    Crackers, need to be cast in the same light. "The no-life half-wit cracker who in his spare time obviously sexually molests small children and pets broke into ..... XYZ corp.", etc. Journalists (even technical Journalists) can help cast such slime as these in proper light instead of making them into -shudder- folk "heroes".

    jccampb

  2. Anonymous Coward
    Anonymous Coward

    Title

    I just have to wonder if this is another back-handed dig at Israel. They seem pretty popular lately.

  3. Anonymous Coward
    FAIL

    Sick and tired....

    of all these "conspiracy" theories.

    "Only a so-called government could write this." riiiiiiiight....

    Having WORKED in the industry, ANYONE can buy a controller for next to nothing and learn how to program the controller. Nothing mysterious about that. Does not require a lot of intelligence or money. Siemens had a lot of security issues with their equipment LONG before this was uncovered. Programming a controller is no different than programming any other piece of hardware. Anyone from Siemens, GE, Rockwell, distributor, customer, etc could have easily written the code.

    Nothing to see here.....move along - just more examples of irresponsible journalism where facts seem to get lost...

  4. Dennis Wilson
    Thumb Up

    Brilliant

    Stuxnet was a masterpiece. It threw Irans nucleur heavy water plants back into the stone age.

  5. James 100
    Alert

    'Lame' - but worked

    A blunt instrument may be a 'crude' and unsubtle murder weapon - but if you get beaten to death with it, you're still just as dead as if you were taken out by a genetically-engineered killer virus or an orbiting deathray. Lame or not, this tool certainly did what it was meant to, meaning it was good *enough*. No doubt the next one will be better in this respect, of course.

Page:

This topic is closed for new posts.

Other stories you might like