The film explains how Iran responded to Stuxnet
by ramping up its own cyber warfare capabilities and going after civilian targets.
He figured out that Stuxnet
was only going after a specific industrial controller, manufactured by Siemens and configured to run a series of nuclear centrifuges.
The power of Stuxnet
technology is that the Iranians can't know what other malware may have been planted in their computers, or what new capabilities America's cyberwarriors may have developed.
Symantec researchers said on Tuesday they have uncovered a piece of code, which they called "Stuxnet
0.5," among the thousands of versions of the virus they recovered from infected machines.
The version discovered by Symantec researchers -- dubbed Stuxnet
0.5 -- was actively used in 2007 and there is evidence to suggest that it might date back to 2005, when the domain names used for its command and control (C&C) servers were first registered.
has been described as a watershed event, there has been little academic discussion on whether it constituted a use of force.
He warned that recently uncovered malwares Stuxnet
, Duqu and Flame are just the tip of the iceberg.
But the biggest threat to everything from power grids to digital oilfields may come from malware based on the Stuxnet
worm, widely thought to have been sponsored by western government agencies, security experts say.
Or, as Michael Tanji reported in Tablet Magazine a year-and-a-half ago of Stuxnet
: "It is an indicator that, at a minimum, confirms what observers of the information warfare field have suspected for some time: When the enemy comes, he'll turn out the lights first.
Two years ago, a virus called Stuxnet
tailored to disrupt Iran's nuclear centrifuges caused some setbacks within its uranium enrichment labs and infected an estimated 16,000 PCs, Iranian officials say.
Still there are a lot of big security incidents impacting India, the biggest one being Stuxnet
that stuck very few countries including Iran, India, Indonesia and Russia.