Saturday, March 21, 2026
  • About us
    • Write for us
    • Disclaimer
    • Terms of use
    • Privacy Policy
  • RSS Feeds
  • Advertise with us
  • Contact us
DefenceTalk
  • Home
  • Defense News
    • Defense & Geopolitics News
    • War Conflicts News
    • Army News
    • Air Force News
    • Navy News
    • Missiles Systems News
    • Nuclear Weapons
    • Defense Technology
    • Cybersecurity News
  • Military Photos
  • Defense Forum
  • Military Videos
  • Military Weapon Systems
    • Weapon Systems
    • Reports
No Result
View All Result
  • Home
  • Defense News
    • Defense & Geopolitics News
    • War Conflicts News
    • Army News
    • Air Force News
    • Navy News
    • Missiles Systems News
    • Nuclear Weapons
    • Defense Technology
    • Cybersecurity News
  • Military Photos
  • Defense Forum
  • Military Videos
  • Military Weapon Systems
    • Weapon Systems
    • Reports
No Result
View All Result
DefenceTalk
No Result
View All Result
Home Defence & Military News Technology News Cybersecurity

Stuxnet a threat to critical industries worldwide: experts

by Agence France-Presse
February 21, 2020
in Cybersecurity, Technology News
3 min read
0
14
VIEWS

Washington: The Stuxnet worm that infiltrated Iran’s nuclear facilities poses a threat to critical industries worldwide such as water, power and chemical plants, cybersecurity experts warned on Wednesday.

Sean McGurk, the acting director of the Department of Homeland Security’s National Cybersecurity and Communications Integration Center (NCCIC), described Stuxnet in testimony before a US Senate committee as a “game-changer.”

Stuxnet, which was detected in July, has “significantly changed the landscape of targeted cyberattacks,” McGurk told the Senate Committee on Homeland Security and Governmental Affairs.

“For us, to use a very overused term, it’s a game-changer,” he said.

Stuxnet targets computer control systems made by German industrial giant Siemens commonly used to manage water supplies, oil rigs, power plants and other critical infrastructure
.

Most Stuxnet infections have been discovered in Iran, giving rise to speculation it was intended to sabotage nuclear facilities there, especially the Russian-built atomic power plant in the southern city of Bushehr.

Computer security firm Symantec said last week that Stuxnet may have been specifically designed to disrupt the motors that power gas centrifuges used to enrich uranium.

Dean Turner, director of Symantec’s Global Intelligence Network, told the Senate panel that while 60 percent of the Stuxnet infections detected were in Iran it should be seen as “a wake-up call to critical infrastructure systems around the world.”

“This is the first publicly known threat to target industrial control systems and grants hackers vital control of critical infrastructures such as power plants, dams and chemical facilities,” Turner said.

Stuxnet was so complex that only a “select few attackers” could develop a similar threat but it highlights that “direct-attacks to control critical infrastructure are possible and not necessarily spy novel fictions,” he said.

“The real-world implications of Stuxnet are beyond any threat we have seen in the past,” Turner warned.

The New York Times reported in September that Stuxnet code includes a reference to the Book of Esther, the Old Testament story in which the Jews pre-empt a Persian plot to destroy them, and is a possible clue of Israeli involvement.

McGurk, the US cybersecurity official, declined to speculate about Stuxnet’s origins or objectives but said US analysis “indicates that a specific process was likely targeted.”

“While we do not know which process was the intended target, it is important to note that the combination of Windows operating software and Siemens hardware can be used in control systems across critical infrastructure sectors — from automobile assembly lines to mixing baby formula to processing chemicals,” he said.

“The concern for the future of Stuxnet is that the underlying code could be adapted to target a broader range of control systems in any number of critical infrastructure sectors,” McGurk said.

“These systems are used to operate physical processes that produce the goods and services that we rely upon, such as electricity, drinking water, and manufacturing,” he said.

“Although each of the critical infrastructure industries, from energy though water treatment, is vastly different, they all have one thing in common: they are dependent on control systems to monitor, control, and safeguard their processes,” the US cybersecurity official said.

McGurk warned that “a successful cyberattack on a control system could potentially result in physical damage, loss of life, and cascading effects that could disrupt services.”

He explained that with Stuxnet, “I don’t have to break into the front door and actually steal the formula or the intellectual property of what you’re manufacturing.

“I can actually go the devices themselves, read the settings and reverse engineer the formula for whatever the process is that’s being manufactured,” McGurk said. “In addition, I can make modifications to the physical environment so that you would be unaware of those changes being made.

“In other words, this code can automatically enter a system, steal the formula for the product you are manufacturing, alter the ingredients being mixed in your product, and indicate to the operator and your anti-virus software that everything is functioning as expected,” he said.

Tags: cybersecurityindustrynetwork securitysecurityStuxnetthreat
Previous Post

Multinational communications test held at White Sands

Next Post

US Army holds first master resilience course in Korea

Related Posts

US needs top cyber coordinator, better hacker ‘deterrence’

‘Digital fog of war’ around Iranian cyberattacks

March 13, 2026

Hostilities on the digital front have intensified since the outbreak of war between the US, Israel and Iran, with many...

US moves closer to retaliation over hacking as cyber woes grow

Cyberattack Disrupts Operations at MedTech Giant Stryker

March 11, 2026

A cybersecurity incident affecting Stryker Corporation—one of the world’s largest manufacturers of medical devices—has drawn renewed attention to the growing...

Next Post

US Army holds first master resilience course in Korea

Latest Defense News

US needs top cyber coordinator, better hacker ‘deterrence’

‘Digital fog of war’ around Iranian cyberattacks

March 13, 2026
US military says aircraft crash in Iraq killed 4 crew members

US military says aircraft crash in Iraq killed 4 crew members

March 13, 2026
Northrop Grumman moves to boost B-21 Raider output

Northrop Grumman moves to boost B-21 Raider output

March 13, 2026
US Navy evacuates virus-struck aircraft carrier Roosevelt

US military ‘not ready’ to escort tankers through Hormuz Strait

March 12, 2026
Israel cancels leave for combat units after Iran consulate strike

US says Iran campaign cost $11 billion in six days

March 12, 2026
US moves closer to retaliation over hacking as cyber woes grow

Cyberattack Disrupts Operations at MedTech Giant Stryker

March 11, 2026

Defense Forum Discussions

  • Royal New Zealand Navy Discussions and Updates
  • Marine Nationale (French Navy)
  • Indonesian Aero News
  • British Army News and Discussion
  • Middle East Defence & Security
  • Royal Australian Navy Discussions and Updates 2.0
  • The Russian-Ukrainian War Thread
  • F-35 Program - General Discussion
  • Royal Australian Air Force [RAAF] News, Discussions and Updates
  • German Navy
DefenceTalk

© 2003-2020 DefenceTalk.com

Navigate Site

  • Defence Forum
  • Military Photos
  • RSS Feeds
  • About us
  • Advertise with us
  • Contact us

Follow Us

No Result
View All Result
  • Home
  • Defense News
    • Defense & Geopolitics News
    • War Conflicts News
    • Army News
    • Air Force News
    • Navy News
    • Missiles Systems News
    • Nuclear Weapons
    • Defense Technology
    • Cybersecurity News
  • Military Photos
  • Defense Forum
  • Military Videos
  • Military Weapon Systems
    • Weapon Systems
    • Reports

© 2003-2020 DefenceTalk.com