No apparent Stuxnet impact in US: cyber official

December 7, 2010
Iranian President Mahmoud Ahmadinejad visiting the Natanz uranium enrichment facilities some 300 kms south of the capital Tehran. Most Stuxnet infections have been discovered in Iran, giving rise to speculation it was intended to sabotage nuclear facilities there.

Computer software targeted by Stuxnet is used in US infrastructure but the virus does not appear to have affected any systems in the United States, a US cybersecurity official said Tuesday.

Greg Schaffer, assistant secretary for cybersecurity and communications in the (DHS), told reporters here that demonstrates the increasingly sophisticated nature of cyber threats today.

"It was a very tiered, very complex, very sophisticated virus," Schaffer told the Defense Writers Group.

"It was looking for specific kinds of and very special implementations within that software," he said.

Stuxnet targets computer control systems made by German industrial giant Siemens and commonly used to manage , oil rigs, and other critical infrastructure.

Most Stuxnet infections have been discovered in Iran, giving rise to speculation it was intended to sabotage nuclear facilities there.

Computer Symantec said last month that Stuxnet may have been specifically designed to disrupt the motors that power gas centrifuges used to enrich uranium.

Schaffer said Stuxnet "focused on specific software implementations and those software implementations did exist in some US infrastructure so there was the potential for some US infrastructure to be impacted at some level."

"There was some risk because those software packages exist within the US ecosystem, but it's not clear that there's any particular process that is in the United States that would have triggered the software," he said.

Schaffer said US experts "made a lot of information available to the community of interest with respect to what the code was really designed to do, which systems it was designed to attack and how it actually worked."

He added cyber threats today are becoming "more sophisticated, more targeted, more capable, harder to detect, harder to mitigate."

"This is no longer a world in which malicious defacements of Web pages are what we are focused on," he said. "We are worried about the migration towards things of value, intrusions that are very targeted and very specific."

"I cannot rule out the potential vulnerability of any system that is connnected to the network today," he said.

"It is widely recognized that the cyber ecosystem that we have today favors the offense and not the defense," he said.

Schaffer declined to discuss the release of secret US diplomatic cables by WikiLeaks. "I really have no comment on the WikiLeaks problem," he said. "DHS has as its focus the protection of our networks."

Explore further: Software smart bomb fired at Iranian nuclear plant: experts

Related Stories

World's first 'cyber superweapon' attacks China

September 30, 2010

A computer virus dubbed the world's "first cyber superweapon" by experts and which may have been designed to attack Iran's nuclear facilities has found a new target -- China.

Stuxnet virus could target many industries

November 17, 2010

(AP) -- A malicious computer attack that appears to target Iran's nuclear plants can be modified to wreak havoc on industrial control systems around the world, and represents the most dire cyberthreat known to industry, ...

Recommended for you

Making 3-D imaging 1,000 times better

December 1, 2015

MIT researchers have shown that by exploiting the polarization of light—the physical phenomenon behind polarized sunglasses and most 3-D movie systems—they can increase the resolution of conventional 3-D imaging devices ...

US ends bulk collection of phone data

November 30, 2015

The US government has halted its controversial program to collect vast troves of information from Americans' phone calls, a move prompted by the revelations of former intelligence analyst Edward Snowden.

1 comment

Adjust slider to filter visible comments by rank

Display comments: newest first

not rated yet Dec 07, 2010
so, one could reasonably assume that whoever developed stuxnet did not want to shoot in own or allied foot?

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.