Stuxnet hits Iran nuclear plant
A project manager at Iran's Bushehr nuclear plant admits Stuxnet has been found on staff computers at the site.


Stuxnet has hit worker computers at Iran's first nuclear power plant, although attacks have been successfully fended off so far, it has emerged.
Many security researchers, including professionals from Kaspersky and Symantec, have suggested the Stuxnet worm had state backing and was primarily being aimed at Iran.
The virus is thought to be the first to directly target major infrastructure complexes and is used to control functions at industrial plants and utilities facilities.
Until now, however, the worm was not known to have hit any major sites in Iran.
Project manager at the Bushehr nuclear plant, Mahmoud Jafari, told the official IRNA news agency in Iran a team was currently trying to take the malware out of a number of computers, the Associated Press reported.
So far, Stuxnet "has not caused any damage to major systems of the plant," Jafari said, and the facility is still set to go online next month as planned.
Many have picked up on the sophistication of the Stuxnet worm, which was recently discovered to exploit an unprecedented four zero-day vulnerabilities at once.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Two of these security holes have not yet been patched, although Microsoft said it hopes to issue fixes in an upcoming security bulletin.
Graham Titterington, principal Ovum analyst, said he expected to see more Stuxnet attacks soon.
"Although the criminal hacker community is well organised and well resourced, it is unlikely that they would have invested so much effort in this one attack, which appears to be more politically than economically motivated," Titterington said.
"Nation level attacks on IT systems have occurred in Georgia, Estonia and in several Middle East countries in the last few years, and so it is not surprising if something similar is happening in this case."
Tom Brewster is currently an associate editor at Forbes and an award-winning journalist who covers cyber security, surveillance, and privacy. Starting his career at ITPro as a staff writer and working up to a senior staff writer role, Tom has been covering the tech industry for more than ten years and is considered one of the leading journalists in his specialism.
He is a proud alum of the University of Sheffield where he secured an undergraduate degree in English Literature before undertaking a certification from General Assembly in web development.
-
Bigger salaries, more burnout: Is the CISO role in crisis?
In-depth CISOs are more stressed than ever before – but why is this and what can be done?
By Kate O'Flaherty Published
-
Cheap cyber crime kits can be bought on the dark web for less than $25
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.
By Emma Woollacott Published
-
Power stations under attack from long-running hacking campaign
News Dragonfly threat group is ramping up activities, say researchers
By Adam Shepherd Published
-
Symantec profits surge as firms prop up their cyber defences
News The company also announced plans to sell its web certificate business
By Dale Walker Published
-
Symantec to pay $4.65 billion to acquire Blue Coat
News Greg Clark to become Symantec CEO, promising new cloud security
By Aaron Lee Published
-
Symantec ditches reseller guilty of scamming PC users
News Silurian told people they had malware, then sold them Norton Antivirus for $249
By Joe Curtis Published
-
NATO builds up cyber alliance with Symantec tie-in
News Military industrial link up to fight cyber attacks
By Rene Millman Published
-
Junk emails fall to their lowest rate in 12 years
News Spam is dropping, says Symantec, but other malware threats are on the rise
By Joe Curtis Published
-
Kaspersky: "We have never been asked to whitelist malware"
News A company blog has revealed neither government nor any other entity has asked it to stop detecting malware
By Clare Hopping Published
-
Symantec confirms split into separate security & storage entities
News Storage and security will be separated as Symantec tries to boost sales in both
By Adam Lee Published