Stuxnet virus was planted by Israeli agents using USB sticks, according to new report


Even before computer security researchers began prying it open, one of the more plausible theories on the origin of the infamous Stuxnet worm claimed that the virus was planted within Iranian nuclear facilities by an Israeli agent using USB memory sticks. A new report from Richard Sale of ISSSource seems to support this theory, citing former and senior US intelligence officials who claim that Israel hired proxies to insure the infection of Iran's Natanz facility.

Since its discovery in 2010, Stuxnet has been billed as the most sophisticated computer virus ever created, a labyrinthine masterwork of code that burrowed into hundreds of thousands of systems using a record-shattering 20 zero-day security exploits. Its programming was so complex that it took researchers months to unravel the virus' true purpose as it lay dormant within computer systems around the world. Further investigation revealed that the virus had a specific list of targets, focusing specifically on SCADA (supervisory control and data acquisition) systems created by Siemens to monitor and control industrial processes. Stuxnet completed its mission after damaging centrifuges used for uranium enrichment in the Natanz facility, as Wired reported last year.

The intelligence officials, who requested anonymity due to their proximity to investigations, believe the agents were recruited from Mujahedeen-e-Khalq (MEK), a group of Iranian dissidents with a sordid and violent history who have been allegedly responsible for targeted killings of Iranian nuclear scientists at the behest of the Israeli intelligence service, Mossad, according to the report. Rather than assume the virus would take root naturally, an agent was reportedly directed to load memory sticks containing the virus code on computer systems deep inside the Natanz facility. According to ISSSource, US officials said they suspect the virus was then unleashed into the systems by the user simply by clicking the executable's icon in Windows.

The Verge
Log In Sign Up

Log In Sign Up

Please choose a new Verge username and password

As part of the new Verge launch, prior users will need to choose a permanent username, along with a new password.

Your username will be used to login to Verge going forward.

I already have a Vox Media account!

Verify Vox Media account

Please login to your Vox Media account. This account will be linked to your previously existing Eater account.

Please choose a new Verge username and password

As part of the new Verge launch, prior MT authors will need to choose a new username and password.

Your username will be used to login to Verge going forward.

Forgot password?

We'll email you a reset link.

If you signed up using a 3rd party account like Facebook or Twitter, please login with it instead.

Forgot password?

Try another email?

Almost done,

By becoming a registered user, you are also agreeing to our Terms and confirming that you have read our Privacy Policy.



Choose an available username to complete sign up.

In order to provide our users with a better overall experience, we ask for more information from Facebook when using it to login so that we can learn more about our audience and provide you with the best possible experience. We do not store specific user data and the sharing of it is not required to login with Facebook.