FourWinds10.com - Delivering Truth Around the World
Custom Search

New cybervirus found in Japan / STUXNET designed to attack off-line servers via USB memory sticks

Smaller Font Larger Font RSS 2.0

Date: Sat, Mar 19, 2011 at 7:45 PM

Subject: New cybervirus found in Japan / STUXNET designed to attack off-line servers via USB memory sticks

To: "Jimmy Boegle, Editor" <jboegle@tucsonweekly.com>

Cc: John Humenik <jhumenik@azstarnet.com>, Mark Evans <mevans@tucsoncitizen.com>

     Note! Before you read the main article below, read the following comment from the WRH website that just posted the Japanese article...
---------------------
Here is a nightmare scenario for you.

1. Israel and the US create Stuxnet .

2. Stuxnet is deployed to wreck Iran's nuclear power station .

3. But Stuxnet escapes from its intended target and spreads across Asia!

4. As the above article documents, Stuxnet was in Japan last October, presumably still spreading and intended to wreck nuclear power plants.

5. Stuxnet targets the Siemens controller

6. Fukushima uses the Seimens controllers Stuxnet was designed to interfere with!

     So now the difficulty the Fukushima nuclear plant operators faced in recovering control over their runaway reactors takes on a darker significance. Remember that the first problem following the quake was that the automated shutdown systems failed to operate at some of the reactors, because pumps failed and valves would not open even while running on batteries; the very sorts of mischief Stuxnet supposedly was designed to cause at Iran's power station.

Did we all just get hacked to death by Israel?

Would anyone reading this in Japan please forward to the Fukushima managers.
-------------------------------
New cybervirus found in Japan / Stuxnet designed to attack off-line servers via USB memory sticks
(Open URL to access Links)

The Yomiuri Shimbun

Stuxnet, a computer virus designed to attack servers isolated from the Internet, such as at power plants, has been confirmed on 63 personal computers in Japan since July, according to major security firm Symantec Corp.
The virus does not cause any damage online, but once it enters an industrial system, it can send a certain program out of control.

Symantec says the virus reaches the servers via USB memory sticks, and warns against the careless use of such devices.

Systems at power plants, gas stations and water facilities are not connected to the Internet to protect them from cyber-attacks.

A Symantec engineer who has analyzed the virus said it was made using advanced technology, and it is highly likely a well-funded organization, not an individual, produced it. The virus has spread throughout the globe via the Internet.

After Stuxnet finds its way onto an ordinary computer via the Internet, it hides there, waiting for a USB memory stick to be connected to the computer, when it transfers itself to the memory stick. When the USB device is then connected to a computer linked to an isolated server, it can enter the system and take control of it.

As computers that harbor Stuxnet do not operate strangely, the virus can be transferred to a memory stick inadvertently.

According to the security company, the virus is designed to target a German-made program often used in systems managing water, gas and oil pipelines. The program is used at public utilities around the world, including in Japan.

The virus could cause such systems to act erratically, and it could take months to restore them to normal.

The 63 infected computers found in Japan were likely infected sometime after June.

According to the company, about 60 percent of the computers that have been infected with the virus were discovered in Iran. Since September, about 30,000 computers there have been found to be infected with the virus. The country's Industry and Mines Ministry has called the virus an electronic act of war.

Some computers at the Iranian Bushehr nuclear power plant, which is scheduled to begin operation in October, have been infected with the virus.

A supervisor at the plant said the virus has not damaged the facility's main computer system and would not affect its planned opening.

In Japan, no public utilities have been affected by the virus. Nevertheless, the Cabinet Office's National Information Security Center has urged electric power companies to exercise extreme care when using USB devices, and to scan any programs that may have been tampered with.

(Oct. 5, 2010)

 National

 N-plant hopes for power soon / Tokyo firefighters blast over 60 tons of water on No. 3 reactor  (Mar.20)

 Kansai offers evacuation centers to quake victims  (Mar.20)

 Minami-Sanrikucho a ghost town / No bodies, survivors found in tsunami-hit Miyagi Pref. community  (Mar.20)

 Foreign governments frustrated with Japan  (Mar.20)

 Japan-U.S. relief efforts expanding  (Mar.20)

 Cooking rice in a pot during blackouts  (Mar.20)

 Evacuees with babies need special care  (Mar.20)

 Prefab homes being built for evacuees  (Mar.20)

 Relief items reach Sendai-Shiogama Port  (Mar.20)

 Cooling operations continue / SDF sprays water on No. 3 reactor; Hyper Rescue squad sent  (Mar.19)

 More

 Home > National 

 The Daily Yomiuri, The Yomiuri Shimbun               

Topics

Quake Info

Photos

DY Weekend

 

Media Data

THE YOMIURI SHIMBUN

THE DAILY YOMIURI

Info

WHO WAS RESPONSIBLE?