Stuxnet: The Cyber Weapon That Destroyed Iran's Nuclear Program

แชร์
ฝัง
  • เผยแพร่เมื่อ 21 พ.ย. 2024

ความคิดเห็น • 1.5K

  • @disgruntledtoons
    @disgruntledtoons 6 หลายเดือนก่อน +1017

    One thing that was touched on really needs emphasis: The Iranian nuclear program managers had wisely adopted one of the most effective defenses against cyberattack: Their systems were not connected to the Internet, and it required what is effectively inside assistance to even begin to attack that system. Whenever I read about a security breach of any system, my first question is always, "Why was this connected to the Internet at all?" Many compromised systems did not require Internet connectivity in order to accomplish their official purposes.

    • @pitchforkpeasant6219
      @pitchforkpeasant6219 6 หลายเดือนก่อน +27

      For some things governments (politicians) require things to be connected to the internet so they have access to all the information. And they call the people paranoid🤦

    • @n0tepad
      @n0tepad 6 หลายเดือนก่อน

      What I don't understand is how this story went from "airgap" to "stuxnet reported back its findings" and "it infected other machines on the internet"
      HUH???

    • @Visiopod
      @Visiopod 6 หลายเดือนก่อน

      @@pitchforkpeasant6219 You don't need the internet to gain access to all information. Just a data center with no internet connection and a code scanner that only works with the fingerprints of the politicians in office. They could even have this data center in the parliament and having touch screens linked up to it in every meeting room, without ever requiring the internet. You can also set up a LAN that isn't connected to the internet, if you want to make short range wireless connection true. LAN is just Local Area Network and can totally be done without using the World Wide Web aka the internet. Whenever you don't have an internet connection, you usually do have a LAN connection, meaning you should have access to your LAN, just not the WWW, so if you have a local NAS, you can still connect to that. You just cant connect to anything outside your home, as you only have a LAN connection and not a WWW connection.

    • @flagmichael
      @flagmichael 6 หลายเดือนก่อน +73

      @@pitchforkpeasant6219 That could hardly be more wrong. FERC rules in the USA require they NOT be connected to the world outside the Physically Secure Perimeter except through a very tightly managed manual interface controlled by vetted staff. Serious fines (hundreds of thousands for individuals, tens of millions for companies that are lax) and prison time for individuals awaits those who violate CIP rules.
      When I worked in bulk electric power we had nearly an entire day of CIP training and testing every year.

    • @Snaproll47518
      @Snaproll47518 6 หลายเดือนก่อน +18

      Air-gapped computers can fall victim to hacking through sophisticated techniques that leverage physical access, electromagnetic signals, and even sound waves.

  • @CubensisEnjoyer
    @CubensisEnjoyer 6 หลายเดือนก่อน +936

    Been studying cybersecurity for several years and working as a Security Analyst some of that time as well, so I'm all too familiar with Stuxnet, but I will never get tired of hearing this story. Stuxnet was truly a monumental achievement (for someone at least) and a total game changer in terms of how offensive cyber operations were viewed. One of my favorite case studies that I constantly return to in my career, I still gain new insights every time I do so. Happy to say that Warographics did the story justice! And the crazy part is this video is just the tip of the "Stuxnet lore" iceberg.🤯

    • @goosenotmaverick1156
      @goosenotmaverick1156 6 หลายเดือนก่อน +29

      Have you heard the podcast from Jack Rhysider called "Darknet Diaries"?
      I assume you likely have, but that's a good one on it too if you haven't had a listen. (Good podcast in general too, IMO)

    • @CubensisEnjoyer
      @CubensisEnjoyer 6 หลายเดือนก่อน

      @@goosenotmaverick1156 That was pretty much the spark for why I got into cybersecurity, Stuxnet was the first episode I listened to after the Silk Road ones. After that it was set in stone. I owe a lot to Jack Rhysider for giving us Darknet Diaries 🙂

    • @motianton
      @motianton 6 หลายเดือนก่อน

      Hes a topguy, thanks for reminding me abt him ​@@goosenotmaverick1156

    • @mastpg
      @mastpg 6 หลายเดือนก่อน +16

      You misspelled "Israeli counter intelligence in conjunction with a joint NSA-CIA team".

    • @jeebusk
      @jeebusk 6 หลายเดือนก่อน

      only one joint?
      ​@@mastpg

  • @SirSpenace
    @SirSpenace 6 หลายเดือนก่อน +293

    I learned about Stuxnet back in 2011 when I was taking a Cybercrimes course in Ireland. I remember being blown away by how smart of a program it was.

    • @jochn919
      @jochn919 6 หลายเดือนก่อน +4

      In 2011 that's when Israelis used Stuxnet on Fukushima plant.

    • @windowsill9724
      @windowsill9724 6 หลายเดือนก่อน

      @@jochn919no

    • @hammerr
      @hammerr 6 หลายเดือนก่อน +1

      Took less than 20 people too

    • @Frost640
      @Frost640 6 หลายเดือนก่อน +50

      @@jochn919 Did you miss the part of history when a god damn earthquake and tsunami hit Japan?

    • @patrickbrinkmeier1858
      @patrickbrinkmeier1858 6 หลายเดือนก่อน +27

      @@Frost640 ...He doesn't care about facts or the truth...Just a typical troll.

  • @mikeyhendri
    @mikeyhendri 6 หลายเดือนก่อน +265

    For the ones asking. Stuxnet dit copy itself on usb drives. Once the plc are updated, the virus send files to the drive, and if that drive is connected to a computer that is connected to the internet it sends data back. No plant is compledley airgapped. Just the most importand machines

    • @hgv1883
      @hgv1883 6 หลายเดือนก่อน +9

      A very reasonable explanation thanks 👍🍻

    • @sebastianbenner977
      @sebastianbenner977 6 หลายเดือนก่อน +8

      But why airgap anything at all, if that machine is connected to a device which isn't airgapped?

    • @fofopads4450
      @fofopads4450 6 หลายเดือนก่อน +8

      @@sebastianbenner977 because is a flawed air gap system

    • @LuLeBe
      @LuLeBe 6 หลายเดือนก่อน +7

      @@sebastianbenner977it wouldn’t be directly connected to it, but a thumb drive for example would eventually need to be used to install a software update or transfer some data.

    • @robertroy1878
      @robertroy1878 6 หลายเดือนก่อน +3

      You answered my question before I could ask it.

  • @mookie2637
    @mookie2637 6 หลายเดือนก่อน +84

    Thjis is a very simplistic account. Firstly, it seems to ignore entirely the straightforward point that the Natanz centrigues were entirely interconnected by a pressure detection system, also controlled by PLCs, which would take individual centriguges offline if they were found to be an issue (bear in mind that we are talking about very small pressure differences). This probably required not only the possession of P1 centrifuges, but a much higher level of testing in which multiple P1s were actually connected by an automated overpressure system, which may actually have used uranium hexafluouride. This pressure system was how the first attack probably damaged the centrigues; and was actually quite difficult to detect. This first attack may not have involved Israel. And secondly this account also seemingly ignores the point that there was distinctly more than one attack - using differnt techniques, in which different actors were involved. The second, for example, was the one that actually went after the rotor PLCs. And the "leak" referred to may have been the worm looking for serial numbers of specific Siemens PLCs.

    • @olfrygt
      @olfrygt 5 หลายเดือนก่อน +25

      It's an half-hour youtube video. It's bound to be simplistic. The details you added where left out for good reason.

    • @JackaWilko
      @JackaWilko 4 หลายเดือนก่อน +2

      Bruh

  • @LeviThomass
    @LeviThomass 6 หลายเดือนก่อน +299

    As a computer science student, this stuff is fascinating to me. I found a video about Stuxnet recently and had been wanting a video from you breaking it down ever since!

    • @CheekyMenace
      @CheekyMenace 6 หลายเดือนก่อน +9

      Watch, Zero Days.

    • @JonnyMack33
      @JonnyMack33 6 หลายเดือนก่อน

      Yeah course you did

    • @LeviThomass
      @LeviThomass 6 หลายเดือนก่อน +3

      @@JonnyMack33what’s that supposed to mean?

    • @d4Rk42
      @d4Rk42 5 หลายเดือนก่อน

      Read or listen to "Countdown to Zero Day" (audio)book 😊

    • @mikemichaelson120
      @mikemichaelson120 5 หลายเดือนก่อน

      He gets a lot of stuff small stuff wrong in this video

  • @concadium
    @concadium 6 หลายเดือนก่อน +66

    I highly recomment reading "To kill a centrifuge" by Langner, it is their version of the Stuxnet analysis and covers the whole operation in a lot of detail.

    • @rubyruby7573
      @rubyruby7573 หลายเดือนก่อน +1

      You Should Listen To The Song "spin spin sugar" Because That Was The Situation Inside That Facility

  • @jasonjacoby
    @jasonjacoby 6 หลายเดือนก่อน +948

    The virus didn't just require a USB stick, it could embed itself on devices that used the USB port. Seriously one of the smartest weapons I've ever seen.

    • @theredboneking
      @theredboneking 6 หลายเดือนก่อน +6

      Used on the Fukushima nuclear plant as well.

    • @freedombro
      @freedombro 6 หลายเดือนก่อน +63

      ​@@theredbonekingsource ? 🤔

    • @theredboneking
      @theredboneking 6 หลายเดือนก่อน +4

      @@freedombro FUKUSHIMA: 10 reasons our planet is doomed (2018)

    • @theredboneking
      @theredboneking 6 หลายเดือนก่อน

      @@freedombro #8

    • @theredboneking
      @theredboneking 6 หลายเดือนก่อน +1

      Number eight on the list.

  • @Calebgoblin
    @Calebgoblin 6 หลายเดือนก่อน +180

    I remember being told about this as a cautionary tale of the dangers of picking up random USB sticks

    • @sketch6995
      @sketch6995 6 หลายเดือนก่อน

      I found one in a parking lot a few days ago.....I sandboxxed the hell out of it and found......porn

    • @jimjackson4256
      @jimjackson4256 6 หลายเดือนก่อน +9

      What? i pickup random usb sticks all the time and stick them into all my computers.

    • @devalue7064
      @devalue7064 6 หลายเดือนก่อน

      Unless you are working with classified information, chances of getting virus from a USB stick would be the same as getting it from the internet

    • @williamstidham7704
      @williamstidham7704 5 หลายเดือนก่อน +1

      @jimjackson4256
      Same. Never know, might be a crypto wallet on there with millions, or perhaps some zesty nudie pics.

    • @sibusisondlovu9516
      @sibusisondlovu9516 5 หลายเดือนก่อน +4

      @@jimjackson4256 Oops!

  • @ignitionfrn2223
    @ignitionfrn2223 6 หลายเดือนก่อน +47

    1:45 - Chapter 1 - The timeline
    18:55 - Chapter 2 - The unsolvable equation ; fanny , flame & flowershop
    22:00 - Chapter 3 - The future

  • @armlegx
    @armlegx 6 หลายเดือนก่อน +87

    I think $300M/year of delay is actually decent. In comparison to a "new bomb" which would need its own research and development and a bespoke production line for a limited number of bombs and it looks like maybe a wash.

    • @Rootiga
      @Rootiga 6 หลายเดือนก่อน +10

      Exactly my thoughts, conventional weapons always cost significantly more in R&D (not to mention the cost of physical resources as well)

    • @Upgraydde-yo-pitch
      @Upgraydde-yo-pitch 3 หลายเดือนก่อน

      Lmao it literally propelled there nuclear program forward dramatically… you can see this if you research into the zero day exploit… they also moved there program underground so far that they can’t be hit by any us bombs

  • @irflashrex
    @irflashrex 6 หลายเดือนก่อน +95

    Beware of the USB stick in the parking lot.

    • @MrBsir390
      @MrBsir390 3 หลายเดือนก่อน

      FlipperZero used by Mossad.

  • @JonMidtan
    @JonMidtan 6 หลายเดือนก่อน +71

    The script is usually very tight on here.
    'An existential crisis to their existence'
    The exception that proves the rule.

    • @removechan10298
      @removechan10298 6 หลายเดือนก่อน +1

      what are the first 20 words of this video?

    • @lisaschuster686
      @lisaschuster686 6 หลายเดือนก่อน +3

      I heard that too, but it’s nothing compared to the usual TH-cam mistakes.

  • @FlyWithFitz81
    @FlyWithFitz81 6 หลายเดือนก่อน +190

    Not to be confused with Suxnet, the.... other way to make things blow.

    • @CrackheadArsonist
      @CrackheadArsonist 6 หลายเดือนก่อน +8

      😂😂😂

    • @warthunder-mf8nv
      @warthunder-mf8nv 6 หลายเดือนก่อน +2

      rofl

    • @BonShula
      @BonShula 6 หลายเดือนก่อน

      @@CrackheadArsonist What is that PFP? Igor

    • @dieselgoinham
      @dieselgoinham 6 หลายเดือนก่อน +25

      Can I purchase this software for my wife?

    • @marilynlucero9363
      @marilynlucero9363 6 หลายเดือนก่อน +4

      You win the internet for the day. Congratulations.

  • @charleswomack2166
    @charleswomack2166 6 หลายเดือนก่อน +29

    I absolutely love how Simon uses his voice to keep everyone on the edge of their seat.

  • @landlubbber
    @landlubbber 6 หลายเดือนก่อน +19

    Worth noting that we actually don't know just how effective the Stuxnet development was, since it's possible that many techniques and maybe other zero-days are still in use in other attacks around the world.

    • @revcor632
      @revcor632 6 หลายเดือนก่อน +2

      We don’t “know” nearly as much as this video suggests… it relies pretty heavily on one questionable article as its “source”

    • @DanielSmith-lv5ed
      @DanielSmith-lv5ed 3 ชั่วโมงที่ผ่านมา

      What they need to build is a digital arena somewhere where all the best powers are, thataway, if anyone does comendeer a system it will be one seperate out in the desert with really big diodes. With fuses on both sides.
      Test dummy type stuff so as to absorb the blow.
      Another thing, giving a cpu system, human status ie ssn,bc,dl, but then sanctioning it by the finance dept! Lol
      Itd be official
      Lol itd work

  • @ZechsMerquise195
    @ZechsMerquise195 6 หลายเดือนก่อน +8

    I remember when news of Stuxnet first appeared. I was studying IT at the time and didn't really grasp the enormous possible consequences. Some people I studied with, and who had a lot more experience, were terrified. Some thought it might spell the end of the internet.

  • @MrTexasDan
    @MrTexasDan 6 หลายเดือนก่อน +13

    The Stuxnet operation crosses the line into art. So elegant and clever.

    • @MrTexasDan
      @MrTexasDan 6 หลายเดือนก่อน

      @@removechan10298 Really? Do tell.

  • @bitmau5
    @bitmau5 6 หลายเดือนก่อน +30

    I remember when this happened. I also vividly remember, how at the time, my work place was full of PLC's. I was very tech minded and a lot of access to things that I probably shouldn't have. Stuxnet was some scary stuff, for the potential havoc it could wreak on just about any company, anywhere with a PLC. It just made me realize how exposed we are when it comes to hardware security.

    • @Bobbias
      @Bobbias 6 หลายเดือนก่อน +4

      Especially since it was (and often still is) rare for companies to take PLC security that seriously.
      It's also frustrating that many PLC manufacturers like to hid behind obscurity as security rather than keep information out in the open so it can be properly audited by people who actually care about security.

    • @charlesdada6434
      @charlesdada6434 6 หลายเดือนก่อน

      Um, what's a PLC?

    • @Bobbias
      @Bobbias 6 หลายเดือนก่อน

      @@charlesdada6434 Programmable Logic Controller. It's a small industrial PC which is designed to interface with industrial sensors and equipment. Typically the only IO they have built in is some kind of networking, and either built in digital logic (usually at 24 volts) or some way to interface with external logic cards. They may have analog IO available, and they often have extension modules that can add significantly more IO. They're often programmed using Ladder Logic, or other simplified programming languages. PLCs don't typically run a standard OS, but instead run the user's code more or less directly. This is because they need to be able to react to changes in the inputs extremely fast.
      Most of the time the way they work is highly proprietary, and because they are very spplication specific, few people outside of industrial process and controls know anything at all about them. Many of the people programming them are either electricians or electrical engineers (or are self taught from elsewhere in some company) rather than computer programmers.

    • @flagmichael
      @flagmichael 6 หลายเดือนก่อน +1

      @@charlesdada6434 Programmable Logic Controller. It is a generic controller with a bunch of inputs and outputs. The programming is what makes it work in all sorts of devices: street lights, water treatment, lighting in a building of any size... if you have read or seen "I, Robot" you get the idea.

  • @SavageDragon999
    @SavageDragon999 6 หลายเดือนก่อน +179

    If Natanz was truly airgap, how could the virus send information back to the US?

    • @night_light2867
      @night_light2867 6 หลายเดือนก่อน +116

      There are ways an app can use any piece of wire as a transmitter same as how phones use headphone jack as radio antennas and there are many more ways

    • @jacko101
      @jacko101 6 หลายเดือนก่อน +10

      Exactly what I was thinking...!

    • @SavageDragon999
      @SavageDragon999 6 หลายเดือนก่อน +100

      @@night_light2867 This crucial piece of information should've been addressed in the video in depth because without a way to transmit information, it's useless.

    • @d_n_u
      @d_n_u 6 หลายเดือนก่อน +7

      Do y'all have any video recs on the topic, did a quick search but found nothing :(

    • @THE-X-Force
      @THE-X-Force 6 หลายเดือนก่อน +27

      OTHER computers that were infected sent information back. Not the air-gapped ones.

  • @torinnbalasar6774
    @torinnbalasar6774 6 หลายเดือนก่อน +34

    The story I had originally heard about how Stuxnet infiltrated the facility was a usb drive dropped in the parking lot. Had no idea it was a long-term program with two-way communication rather than a single attack destroying the centrifuges. The description I was aware of had claimed that the worm cloned parts of itself onto more usb drives to carry it back out of the facility in order to reach an internet-connected device it could deliver a "job complete" message through, but if it was able to receive updates regularly, there was clearly a more reliable communication method established that breached the air-gapped nature of the network.

    • @alperenozturk9235
      @alperenozturk9235 6 หลายเดือนก่อน +4

      I believe there is still a classified part of HUMINT work on the background.

    • @ftffighter
      @ftffighter 6 หลายเดือนก่อน +1

      I've always wondered if the high rate of the centerfuges caused vibrations that could be felt outside somehow and those vibrations were the transmission?

    • @Cumdown
      @Cumdown 6 หลายเดือนก่อน

      ​@@ftffighterwhat is the receiver in this case?

    • @nicknickels7951
      @nicknickels7951 6 หลายเดือนก่อน

      😂 🆒 interesting...

  • @dizefx
    @dizefx 6 หลายเดือนก่อน +11

    Zero Days is a nice documentary about this. Some NSA whistleblowers say their part too, undercover ofc. Strongly recommend it.

  • @Matze-c1j
    @Matze-c1j 6 หลายเดือนก่อน +27

    I had to write a report on this when I was taking cybersecurity classes. Definition of a watershed moment.

    • @Matze-c1j
      @Matze-c1j 6 หลายเดือนก่อน

      @@rosem7889
      wa·ter·shed
      /ˈwôdərˌSHed,ˈwädərˌSHed/
      noun
      noun: watershed; plural noun: watersheds
      1.
      an area or ridge of land that separates waters flowing to different rivers, basins, or seas.
      an area or region drained by a river, river system, or other body of water.
      2.
      an event or period marking a turning point in a course of action or state of affairs.
      "these works mark a watershed in the history of music"
      Thanks, Google!

    • @Cumdown
      @Cumdown 6 หลายเดือนก่อน +1

      Watershed is (and I start with this as I find it interesting) the catchment area of rivers, streams, lakes. The line between each catchment area is rather definitive, hence its use.
      A watershed moment refers to a deep change in thinking, approach, direction, of how one thinks about something.
      Hope the above helps ❤

    • @harku123
      @harku123 6 หลายเดือนก่อน +3

      ​@@rosem7889 watershed moment means an important point in history that would change the future

    • @ZeSgtSchultz
      @ZeSgtSchultz 6 หลายเดือนก่อน

      ​@@harku123I wonder if the first watershed moment was the flood after the ice age?

    • @pitchforkpeasant6219
      @pitchforkpeasant6219 6 หลายเดือนก่อน

      @@harku123like destroying a facility in iran? During obama? It happened

  • @ratchet2505
    @ratchet2505 6 หลายเดือนก่อน +57

    The most scary part, most maleare is sitting dormant waiting for an action command to start attacking. We haven't even had the first real spark yet.

    • @scheikundeiscool4086
      @scheikundeiscool4086 6 หลายเดือนก่อน +2

      I do wonder if this fact is something that is stopping nuclear war. Because all sides are now scared that their own weapons are compimised and an attack might backfire.

    • @antoy384
      @antoy384 6 หลายเดือนก่อน +2

      @@scheikundeiscool4086Given that the average programmer on Stuxnet wasn’t better than the average consultant (the only genius was bought by the mass of developers working on it), I can’t imagine what a missile infested with viruses from all nations would look like. Indeed, no one would be able to launch it.

    • @revcor632
      @revcor632 6 หลายเดือนก่อน +6

      What makes you think that “most malware” is like this..?

    • @tomlxyz
      @tomlxyz 6 หลายเดือนก่อน

      I'm wondering how much of this type of malware like Stuxnet is out there that is already doing its work but doing it so slowly that it doesn't get detected. Like imagine attacking a company or a whole country in a way that they become just slightly too inefficient to still run profitable/having GDP growth. Kinda like killing someone with a slow acting poison so it looks they just died of an illness

    • @m2heavyindustries378
      @m2heavyindustries378 6 หลายเดือนก่อน +8

      Man couldn't even spell 'malware' properly with the help of spellcheck and cut and paste, it's likely just some edgy teen on his family computer

  • @yanikq
    @yanikq 6 หลายเดือนก่อน +1

    Usually a religious Warographics listener, but rolled my eyes on the release of this stuxnet episode. So didn't listen to it immediately but I'm grateful for "the algorithm" sneaking it into the autoplay-list.
    I thought I already knew everything there was to know but then Mr. Whistler's team goes and unearthed the Dutch connection.
    Well done, well done
    👏

  • @nolongerblocked6210
    @nolongerblocked6210 6 หลายเดือนก่อน +31

    Everyone likes to think only China or Russia has high quality hackers, the truth is the US has the best hackers in the world(TOA)... to go along with the best military equipment in the world

    • @mill2712
      @mill2712 6 หลายเดือนก่อน +13

      The reason we don't hear about it is because...
      1. We aren't trying to mess with the common company or citizenry in those countries.
      2. The best attacks are the ones they don't know about.
      3. If those countries know they got hit, they aren't telling that they got hit.

    • @DanSoloha
      @DanSoloha 6 หลายเดือนก่อน

      Our equipment is overpriced and over sophisticated - it relies too heavily on technology, which is highly prone to electronic warfare/ jamming, as seen in Ukraine
      Edit: some of our equipment, I should clarify; systems like HIMARS and Javelin, for example, have proven highly effective

    • @santman3200
      @santman3200 6 หลายเดือนก่อน +5

      @@DanSoloha Ovepriced sure, over sophisticated fuck no. Literally non of the high end equipement has been given to ukraine so I don't know what you are yapping about with elecotrninc warfare.

    • @dianapennepacker6854
      @dianapennepacker6854 6 หลายเดือนก่อน +3

      ​@@DanSolohaThe things Russia has jammed only partially jammed it. A lot of them have back ups like interial navigation which has improved. Remember we give them hand me downs.
      Or could be taken out quickly when used with weapons the US has but Ukraine does not in great numbers. Like aircraft and harm missiles.
      Those bombs and shells were less accurate, but still much more accurate than dumb fire munitions.

    • @noahgray543
      @noahgray543 6 หลายเดือนก่อน +1

      ​@DanSoloha oh look, one of the "Reformers." We've been hearing this since the F-16 and it proved you guys wrong hard. Go play with rocks, luddite.

  • @jfk4229
    @jfk4229 5 หลายเดือนก่อน +3

    Working with PLC's daily I can assure you they are some of the biggest cybersecurity nightmares. Because uptime is very much preferred over cybersecurity. Even if you know about issues, you cant deploy them cause uptime.

  • @melchiel4413
    @melchiel4413 6 หลายเดือนก่อน +47

    Much as there was once an age of pike and shot, we are now in the age of drones and hackers. It would be wise to be the first to adopt them skillfully.

    • @jaybee9269
      @jaybee9269 6 หลายเดือนก่อน +9

      Cyber commands already exist.

    • @ljt3084
      @ljt3084 6 หลายเดือนก่อน

      Except the CIA didn't use it wisely and aside from attacking a country the western powers always like to paint as an aggressor, Stuxnet threatened a lot of computer services globally including the British NHS at the time.

    • @kameronjones7139
      @kameronjones7139 6 หลายเดือนก่อน +3

      ​@@jaybee9269 yeah dude is a good 20-30 years behind

    • @jishani1
      @jishani1 5 หลายเดือนก่อน

      If you think we're not still in an age of pike and shot look into the defense minister in the UK suggesting a draft and stating they're not prepared to defend themselves against Russian aggression.

    • @kameronjones7139
      @kameronjones7139 5 หลายเดือนก่อน

      @@jishani1 that is the uk

  • @Vicarious_Heart
    @Vicarious_Heart 6 หลายเดือนก่อน +44

    Stuxnet is gonna need a sequel soon.

    • @mcboat3467
      @mcboat3467 6 หลายเดือนก่อน +19

      And it would be used on apartheid state of Israel

    • @Sam_Guevenne
      @Sam_Guevenne 6 หลายเดือนก่อน +8

      It's called Pegasus

    • @ymtzlgn
      @ymtzlgn 6 หลายเดือนก่อน +21

      @@mcboat3467lol keep dreaming

    • @freedombro
      @freedombro 6 หลายเดือนก่อน +13

      Israel is NOT an apartheid state.
      South africa has no moral ground to stand on ​@mcboat3467

    • @willyvereb
      @willyvereb 6 หลายเดือนก่อน

      ​@@freedombro Lot of people are blind to the complete insanity which is going on South Africa. They kill tens of thousands in violent activities even though they don't have an active war in a tiny region constraining 2 millions to the size of Las Vegas to worry about. There are a lot of terrible things going on there and Gazan needs more help than ever. I just wonder where had been these outcries and protests when other countries used poison gas against minorities, interred an entire population into rape camps or stole all children to re-educate them to another culture. It's easy to blame a minority culture which has good standing with the West and is put against a billion Arabs. It is apparently much harder to actually call out evil deeds done by the side which keeps funneling them all the money to embezzle...

  • @altf2o
    @altf2o 6 หลายเดือนก่อน +5

    Do you know what I’d pay to hear a deep dive, TED talk from the programmers of this? That would be incredible!

  • @BrandonQ1995
    @BrandonQ1995 6 หลายเดือนก่อน +44

    I remember all the talk about Russia's cyber warfare capabilities on the lead up to its invasion of Ukraine. Ended up falling flat. As much as the complexity of viruses are growing, it seems our capabilities in fighting them are as well. Or, Russia just sucks at cyber warfare.

    • @tom.m
      @tom.m 6 หลายเดือนก่อน +13

      I haven't kept up with it, but they did a lot in the early days. News reporters were struggling to do their job as any PC connected to Ukrainian internet got hacked. Many of them ended up sharing a single laptop with a satellite connection.

    • @theforsakeen177
      @theforsakeen177 6 หลายเดือนก่อน

      don't you hear on the news everyday how china has already stolen even IP or data in the US that can be reached digitally? And russia don't steal as much but they are widely suspected to be the ones behind the shadow broker group, as their cyber capabilities are second only to the US.

    • @StephenWest-t2v
      @StephenWest-t2v 6 หลายเดือนก่อน +9

      And Russia has prioritized going after the weakest part of every computer on Earth...the user.

    • @tomlxyz
      @tomlxyz 6 หลายเดือนก่อน

      I assume to some degree they don't want to take everything down but rather use it to spy. If nothing works it won't get new input which could be strategically useful information

    • @Hillary4SupremeRuler
      @Hillary4SupremeRuler 6 หลายเดือนก่อน

      Yes...they hacked the Clinton Campaign with a regular old gmail password reset phishing link ​@@StephenWest-t2v

  • @dat_asian_dude
    @dat_asian_dude 6 หลายเดือนก่อน +6

    Check out Zero Days. It's a documentary style movie about Stuxnet. And there is also a book: Countdown to Zero Day

  • @DerNiederlander
    @DerNiederlander 6 หลายเดือนก่อน +1

    This man has like 1 million channels and is pumping out videos on all of them almost everyday. He is everywhere

  • @davidhawley1132
    @davidhawley1132 6 หลายเดือนก่อน +5

    I'd heard part of this before, but this video put it all together. Good job.

  • @klti0815
    @klti0815 6 หลายเดือนก่อน +5

    There's a great documentary by Alex Gibney called "Zero Days" about it, that looks at it more as the story of discovery and reverse engineering what it actually does. This was a wild time blowing everyones minds about what is really out there. Also, te fact that they found and essentially burned 4 Windows zero days is wild, a no interaction Windows zero day is incredibly hard to find, and worth millions on the open market for these kind of things. Though it probably helped that Windows licensing deals for the military and the likes have included access to the source code for years.

  • @serenity749
    @serenity749 6 หลายเดือนก่อน +3

    I actually requested a deep dive into this on Simons reddit. I'm so happy someone took it up!!! I was thinking Casual Criminalist or Dark Shadows, but it actually makes more sense in Warographics. It is truly shocking to me how little people know about this, much less how under reported it was. I feel like cyber warfare took such a huge leap forward from this event, and I can only find a little content related to it. It's shocking. Scary. The future of cyber warfare is terrifying to me. Hope this video helps to spread awareness. I would have liked to hear this in a free format though. Still, awesome video. Great content!!!!!!!!!!!

  • @LVNCHBOXXX
    @LVNCHBOXXX 6 หลายเดือนก่อน +2

    "SHIMON" - Michael Jackson

  • @THE-X-Force
    @THE-X-Force 6 หลายเดือนก่อน +32

    Has this ever been made into a movie? Because it should be.

    • @dat_asian_dude
      @dat_asian_dude 6 หลายเดือนก่อน +5

      It has. Check out Zero Days.

    • @THE-X-Force
      @THE-X-Force 6 หลายเดือนก่อน +3

      @@dat_asian_dude Sweet .. thank you!

    • @dat_asian_dude
      @dat_asian_dude 6 หลายเดือนก่อน

      @@THE-X-Force anytime dude! Easiest way to watch it is on Max but I think youtube has it for like 5 bucks

    • @TomG-f4r
      @TomG-f4r 5 หลายเดือนก่อน

      Do you tell the good story , or lie lie fib some and exaggerate ? Very goode ideas are hard to come by , how what happened right then , is a grande tale - best never told , they might use it against us , or we might need to do it to them , again . New habits new weaknesses , press on comrade!.. reelect Trotsky!

  • @PopPhyzzle
    @PopPhyzzle 6 หลายเดือนก่อน +3

    aaaaah I love the 80's action movie one liners at the end of your videos.

  • @chingading957
    @chingading957 6 หลายเดือนก่อน +5

    Fascinating video. Please do more on cybersecurity

  • @omegcrash
    @omegcrash 4 หลายเดือนก่อน +1

    very well laid out wish I could share more about the late 90's early 00s but you guys are so over target wonderful video

  • @apexcrypto01
    @apexcrypto01 6 หลายเดือนก่อน +38

    Honestly it's incredible this operation was pulled off. It's refreshing to see the US protrayed so competent. Fu*k anyone who was against this. This is truly bad ass.

    • @theforsakeen177
      @theforsakeen177 6 หลายเดือนก่อน +7

      it got out of hand though when it infected thousands of other computers outside iran.

    • @bmxerkrantz
      @bmxerkrantz 6 หลายเดือนก่อน +4

      imagine what is being done even more competently.... as in enough to not get caught...

    • @andersjjensen
      @andersjjensen 6 หลายเดือนก่อน

      Uh, not having a fail safe against widespread "release" was not exactly competent. Imagine what would have happened if it had ended up in, say, a nuclear power plant, and found Siemens PLCs, and then blindly just treating what was connected to those PLCs as if they were centrifuges. PLCs don't have something like USB Discovery where you can see what's connected to them. They're just dumb "switch boxes" where you need to understand the wiring to be able to understand the code running on them.
      It was advanced, bold, risky and fairly competent. But I'd really like a video of the meeting where someone went "Uh... why the FUCK can this thing spread like wild fire WHILE NOT being capable of removing itself without a trance if it finds itself on Aunt Gerda's freaking laptop?!?"

    • @SeanZ1L
      @SeanZ1L 6 หลายเดือนก่อน +1

      $1b cost for a 3-4 year delay in Iran’s nuclear capability, small bit of a waste of hard working taxpayer money if you ask me but i’m no expect in these matters, neither was the government it seems

    • @hypno5690
      @hypno5690 6 หลายเดือนก่อน

      ​@@SeanZ1Lyeah you're really not an expert. Not much of a layman either tbh.

  • @duke6961
    @duke6961 6 หลายเดือนก่อน +14

    Keep up with these informative and entertaining videos.

  • @christianlibertarian5488
    @christianlibertarian5488 3 หลายเดือนก่อน +1

    I remember when Stuxnet was first revealed. I concluded at the time that either the US or Israel had to have done it, based on who had motivation and ability. Turns out, it wasn’t “either”, it was “and”.

    • @LeRouxshnikov
      @LeRouxshnikov หลายเดือนก่อน +1

      It's normally 'and'.

  • @Kolor-kode
    @Kolor-kode 6 หลายเดือนก่อน +4

    Wasn't just Stuxnet, a whole slew of malware based on the Tilded platform , include Duqu and the star of the show, Stuxnet.

  • @Akmt96
    @Akmt96 6 หลายเดือนก่อน +1

    I love recommending the book Sandworm to people that are curious about this stuff. It largely covers this same story but with more little details

  • @SuperNesus
    @SuperNesus 6 หลายเดือนก่อน +5

    What a throwback! Clicked as soon as i saw that name!!!

  • @Venser420
    @Venser420 6 หลายเดือนก่อน +2

    I live 45min from INL (Idaho National Labs) had zero clue they were involved in this operation. That is pretty neat, I'll have to let a friend of mine who works there know.

    • @pitchforkpeasant6219
      @pitchforkpeasant6219 6 หลายเดือนก่อน

      Anyone you know there at idaho labs ever work with a nuclear energy producing technology that used sodium as a coolant and the system could NOT melt down? The scientists working on it literally tried a melt down and could not do so. Clinton shut it down. Assume too much money from big oil was the motive

  • @theodorsonfors1391
    @theodorsonfors1391 6 หลายเดือนก่อน +3

    I've seen a few videos about stuxnet and I can tell you this is by far the one with the most work put in. Great job researchers.

    • @fautedemieux21
      @fautedemieux21 6 หลายเดือนก่อน +1

      If that's the case... you haven't seen enough.

    • @theodorsonfors1391
      @theodorsonfors1391 6 หลายเดือนก่อน

      @@fautedemieux21 Do you have any suggestions?

  • @oedihamijok6504
    @oedihamijok6504 6 หลายเดือนก่อน +5

    Stuxnet = High-Tier
    Pegasus = Ultra-High-Tier
    Operation Triangulation = God tier

  • @stuartrobb673
    @stuartrobb673 6 หลายเดือนก่อน +2

    It was introduced by encoding every single hard disk manufactured by western digital and seagate at the point of manufacture. That’s how I’d do it

    • @stuartrobb673
      @stuartrobb673 6 หลายเดือนก่อน

      SIS. I’m available for weddings and bar mitzvahs

  • @JeepTJay6
    @JeepTJay6 6 หลายเดือนก่อน +2

    22:48 Holy shit! The algorithm just randomly dropped this in my feed last night. And the Iranian president goes down in a chopper this morning?!? WTF? 😮

  • @tjr3357
    @tjr3357 6 หลายเดือนก่อน +5

    So I have watched a few of your videos, and while I have liked them, I also didn’t really know the subject matter. This one I did, and out of curiosity, I looked and noticed you followed the Wikipedia page on this subject pretty closely/exactly. You have good presentation, and for those unfamiliar with the various subjects you cover, these are great videos. It would be cool to see deeper dives with some independent research, alternate sources, etc.

    • @pitchforkpeasant6219
      @pitchforkpeasant6219 6 หลายเดือนก่อน

      “Zero Days”. A documentary

    • @pitchforkpeasant6219
      @pitchforkpeasant6219 6 หลายเดือนก่อน

      Wikipedia has become a bit manipulated biased in one direction. Its far from reliable these days. Been watching history being revised for over a decade and its just as bad. Almost fifty years of studying history just watching it change like night and day☹️

  • @mro6030
    @mro6030 6 หลายเดือนก่อน +2

    There are some inconsistencies in what is being told here, specially the air gap argument and the program being able to communicate back with its creators.
    There is a 2016 documentary called Zero Days, produced by Alex Gibney that goes deep into Stuxnet, although it is interesting that the Dutch engineer is not mentioned in it.

  • @imadeafunny2109
    @imadeafunny2109 6 หลายเดือนก่อน +12

    I feel like Simon & Team is fast becoming my Walter Cronkite

    • @Bozbaby103
      @Bozbaby103 6 หลายเดือนก่อน

      He (and co) and Beau of the Fifth Column are my go-tos.

  • @henrychinaski846
    @henrychinaski846 6 หลายเดือนก่อน

    Simon, you're an incredibly great presenter! While watching this video I thought of the work and dedication of the author/writer!
    You have a great staff! They deserve more attention! Thank you for your great work!

  • @petertimowreef9085
    @petertimowreef9085 6 หลายเดือนก่อน +23

    10:50 how the heck did the program contact it's creators if the facility's system was totally isolated? If it broadcasted a signal, how come the Iranians didn't pick up on it?

    • @CarlTSpeak
      @CarlTSpeak 6 หลายเดือนก่อน +4

      It didn't. Airgapped. Was exfiltrated from site.

    • @petertimowreef9085
      @petertimowreef9085 6 หลายเดือนก่อน +4

      @@CarlTSpeak Excuse my ignorance but I still don't understand. At 10:57 he says stuxnet "would send this map back to the programmers". What method of data transfer did stuxnet use to communicate that information?

    • @Arcomist
      @Arcomist 6 หลายเดือนก่อน +1

      ​@@petertimowreef9085 As I understand it, if a copy of a virus escaped the site with information (infected a device inside and got carried away to another with internet access) it will connect to the programers and then an updated virus could then again infect the facility

    • @petertimowreef9085
      @petertimowreef9085 6 หลายเดือนก่อน

      @@Arcomist Right, so the virus left the nuclear complex in a physical sense, on a thumb-drive or something?

    • @patrickcarcamo622
      @patrickcarcamo622 6 หลายเดือนก่อน

      ​@@petertimowreef9085Correct, on any device that was infected.

  • @kitcarpo4745
    @kitcarpo4745 หลายเดือนก่อน +1

    What else don't we know? Exploding pagers and walkie talkies? :D

  • @Jp-ue8xz
    @Jp-ue8xz 6 หลายเดือนก่อน +4

    0d exploit when a normal third party found it = Remarkable investigation and skills used to find it 😎
    "0d" exploit when the government finds it in big tech software = They just asked microshoft for their backdoors 😅

  • @larkinwalton4360
    @larkinwalton4360 6 หลายเดือนก่อน

    Fun fact: my buddy and I were the first strategic intel analysts to report on Stuxnet within the US intel community. When we questioned NSA what information hey he on attribution and origination we were told to “cease and desist”.

  • @Elysiel_cherub
    @Elysiel_cherub 6 หลายเดือนก่อน +1

    Darknet Diaries covered this one I think, due to it being about hacking and what not. Good episode.

  • @SkyWolfPirate
    @SkyWolfPirate 6 หลายเดือนก่อน +5

    Yes thank you was watching old video on this the other day

  • @chelulehillary6266
    @chelulehillary6266 หลายเดือนก่อน +1

    Watching this from Lebanon.

  • @pedzsan
    @pedzsan 6 หลายเดือนก่อน +4

    If the facility was air gapped, how did they get data and updates back and forth? Your explanation is critically flawed.

  • @samgordon9756
    @samgordon9756 6 หลายเดือนก่อน +2

    Sometimes it's hilarious to hear people trying to insinuate the US is doing something underhanded. It would honestly be more dramatic to imply the US wasn't developing enhanced capabilities.

  • @Mike-ls1uj
    @Mike-ls1uj 6 หลายเดือนก่อน +3

    Low key reassurance in regards to thier current situation

  • @KylerAntalek
    @KylerAntalek 6 หลายเดือนก่อน +2

    That was the best video I’ve ever seen on TH-cam. Absolutely fascinating.

  • @hachimaru295
    @hachimaru295 6 หลายเดือนก่อน +5

    lawrence of arabia might have been bumped off too riding his motorbike ... just syaing

  • @johnemanuele8695
    @johnemanuele8695 5 หลายเดือนก่อน

    The documentary "ZERO DAYS"..details this undertaking

  • @LtColShingSides
    @LtColShingSides 6 หลายเดือนก่อน +3

    If Iran's nuclear facilities were air gap, how did the virus communicate with the US and israel?
    I'm not calling Simon into question, just curious

    • @gandalf1783
      @gandalf1783 4 หลายเดือนก่อน +1

      Im also curious.
      Infiltrating via USB or the PLCs makes sense, but talking back via what - nothing??

  • @NinjaRunningWild
    @NinjaRunningWild 6 หลายเดือนก่อน +1

    14:57 It wasn't a bug in the code that caused Stuxnet to leak. Phase 3 of it was turned over to Unit 8200 who wanted it to be less subtle & more aggressive. They modified it to spread more rapidly which eventually led to its discovery. This is explained in the excellent documentary "Zero Days" on this entire discovery process & motivations of POG.
    Incidentally, it's worth noting that zero days sell anywhere from $250k to $500k on the black market, meaning that only a nation state can practically afford to make something like this. It's beyond the reach, financially speaking, of any lone hacker or hacker group.

  • @notajetplane
    @notajetplane 6 หลายเดือนก่อน +3

    Wow. I had no idea about any of this. Neat.

    • @Sam_Guevenne
      @Sam_Guevenne 6 หลายเดือนก่อน

      Look up the virus known as Pegasus (It's very very scary"

  • @74357175
    @74357175 5 หลายเดือนก่อน +1

    If the centrifuges were air-gapped to the rest of the Internet, how was Stuxnet able to communicate and update itself?

  • @yungbeetroot
    @yungbeetroot 6 หลายเดือนก่อน +4

    So glad my country is extremely involved in the hypothetical nuclear programs of foreign nations and not our own dying economy

  • @genehenson8851
    @genehenson8851 6 หลายเดือนก่อน

    WTF!?!? I thought I knew all of Simon’s channels yet, somehow, here we are learning about war things, with Simon, on a new channel.

  • @taxibaanyoutube9156
    @taxibaanyoutube9156 6 หลายเดือนก่อน +8

    Long life the Netherlands, long life the Republic.

    • @RAWDEAL064
      @RAWDEAL064 6 หลายเดือนก่อน +2

      *live

  • @infinitenovelty
    @infinitenovelty 5 หลายเดือนก่อน

    Simon has quite possibly the most aggressive inhale I have ever heard 😂

  • @dh1380
    @dh1380 6 หลายเดือนก่อน +4

    "An existential threat to its existence"
    I see 😅
    IIRC it was also Dutch nuclear technology that was stolen by AQ Kahn, the world's most prolific illegal nuclear proliferator and guy who gave Pakistan the bomb.

  • @leafyrox
    @leafyrox 6 หลายเดือนก่อน +1

    I'm just guessing here, but maybe the best outcome of stuxnet was delaying Iran's nuclear capabilities enough so when they sent all those warheads to Israel a month ago, none of them wiped out the region.

  • @kennethnielsen3864
    @kennethnielsen3864 6 หลายเดือนก่อน +3

    Thanks for sharing.

  • @OTbase
    @OTbase 6 หลายเดือนก่อน

    The rotor speed attack doesn't damage the motors, it damages the rotors. Any digital masking of the rotor speed attack would have been foolish because rotors spinning out of whack were easily detected by ear.

  • @sebastianbenner977
    @sebastianbenner977 6 หลายเดือนก่อน +2

    I thought it was mentioned that the facility's computer systems were air-gapped. How then did Stuxnet communicate with US computer systems?

    • @ronjon7942
      @ronjon7942 5 หลายเดือนก่อน

      Wirelessly I suppose. Somehow. Maybe the malware patiently waited until it landed on a machine with a wireless adapter?

    • @MehrLovin
      @MehrLovin 2 หลายเดือนก่อน

      They also had someone on the inside. The NCRI group @Wargraphics cited but purposely avoided discussion on, is known more properly as the MEK and is a foreign backed, Iranian, militant and Marxist group. They renamed the group in the West and avoid discussion of it because they don't want the public to know who their unsavory partners in crime are.

  • @tonybrock5288
    @tonybrock5288 6 หลายเดือนก่อน

    Simon you are a master of speech delivery and hats off to your deserved success! I have started noticing something that troubles me though... In the "early" days your speech was bright and crisp! These days I'm picking up something slightly more slurred. I pray that your health is good but if this is news to you please have it checked out.

  • @Votrae
    @Votrae 6 หลายเดือนก่อน +4

    TIL "specialisms" is a word. Excellent writing and presentation as always!

  • @OmegaDenz96
    @OmegaDenz96 6 หลายเดือนก่อน +2

    Watch the movie "Zero Days" years ago, and definitely got intrigue about this one.

  • @BonShula
    @BonShula 6 หลายเดือนก่อน +9

    I am so thankful for Stuxnet so the Iran regime could not get any nuclear programs activated. Since the Shah's departure the country has been in turmoil

    • @thefeof6161
      @thefeof6161 6 หลายเดือนก่อน

      It set it back a few years, but worry not, iran will get its nuke

    • @Dizzyruptor
      @Dizzyruptor 6 หลายเดือนก่อน

      Iran is a product of our meddling.

    • @markus3451
      @markus3451 6 หลายเดือนก่อน

      The Sha was a tyrannical absolute monarch proped up by our freedom and democracy loving U.S. government hypocritocal disgusting

  • @Axel_Andersen
    @Axel_Andersen 5 หลายเดือนก่อน

    Couple of things jarred me in this video:
    1) I don't think you can repair there centrifuges because they are by definition contaminated, you can only by pass them in the enrichment chain, that is why they are good target for sabotage
    2) First the facility was described as air gapped but next STUXNET phoned home, how did that work, that was not explained or I missed it.
    3) The centrifuges were described as complex, when I fact they are pretty simple although the require very precise manufacturing.
    Probably others but I forgot them already. I would prefer more accurate script writing though this is just infotainment :)

  • @Warhead-haggis
    @Warhead-haggis 6 หลายเดือนก่อน +10

    Did they try switching it off and then switching it back on?

    • @andersgrassman6583
      @andersgrassman6583 6 หลายเดือนก่อน

      Standard advice you get from IT-support. Probably the same in Iran.😂

  • @brotakig1531
    @brotakig1531 6 หลายเดือนก่อน +2

    A country that can't figure out their crap is breaking from a virus DEFINITELY shouldn't have WOMD.

  • @globaled1694
    @globaled1694 6 หลายเดือนก่อน +7

    mfs out here hacking nuclear powerplants meanwhile i cant remember how to unlock my phone

  • @boufnarfarid
    @boufnarfarid 5 หลายเดือนก่อน +1

    The guys that built this malware are legendary!

  • @matthew164
    @matthew164 6 หลายเดือนก่อน +3

    Umm, how can it be updated remotely? Let alone get the data back If it was physically disconnected from the interwebs?

    • @BravoOne1
      @BravoOne1 6 หลายเดือนก่อน +2

      A backdoor could've been installed along with the virus or the virus was programmed to create a backdoor

    • @evrythingis1
      @evrythingis1 6 หลายเดือนก่อน

      Umm, you ever think it could get out the same way the virus got INTO the building ? Are you developmentally disabled?

    • @evrythingis1
      @evrythingis1 6 หลายเดือนก่อน

      @@BravoOne1 What is the point of this bot comment!?

  • @Bramon83
    @Bramon83 4 หลายเดือนก่อน

    correction, they changed how fast the centrifuge spins by only a minor percentile for a small duration and it renders the ENTIRE 30 day cycle ruined. its utterly genius. 5 mins of a speed change ruining a months work and you wont know until its complete. its not a mechanically destructive process. it renders the product useless.

  • @jazdragen
    @jazdragen 6 หลายเดือนก่อน +3

    Simonverse spy stories continue 🎉🎉🎉

  • @OiledLabia
    @OiledLabia 5 หลายเดือนก่อน

    Dear Simon and Associated Team- how many channels do y'all own and how many videos does Simon have to record in a day to keep this level of consistency in terms of uploads?

  • @journeymanjoey55
    @journeymanjoey55 6 หลายเดือนก่อน +3

    Get a DeEsser plugin for your editor. Please.

    • @bmxerkrantz
      @bmxerkrantz 6 หลายเดือนก่อน

      or the writer... danny, no more s's or no more magic thpoon for you!

    • @dsquareddan
      @dsquareddan 6 หลายเดือนก่อน

      ok it's not just me. good god. it's so bad. my ears. and his constant breathing in between words

  • @scylla88shawn14
    @scylla88shawn14 6 หลายเดือนก่อน +1

    Amazing Episode Simon 👏

  • @dark_fire_ice
    @dark_fire_ice 6 หลายเดือนก่อน +3

    Yeah, I wrote a paper on it. Shit is utterly insane

  • @Btstaz
    @Btstaz 6 หลายเดือนก่อน

    If it was air gapped and someone had to physically introduce Stuxnet , after the 11 min mark you talk about Stuxnet sending back facility design and layout as well as then being able to updated Stuexnet remotely. You can't have both an Air gapped system and remote update capabilities.

  • @aftbit
    @aftbit 6 หลายเดือนก่อน +3

    11:00 I don't quite get that. If the network was airgapped, how would the virus exfiltrate information to the US or get updates?

    • @Pepesilvia267
      @Pepesilvia267 6 หลายเดือนก่อน +1

      You can send data through power outlets or maybe use some piece of equipment to generate radio waves. I’ll bet the facility had phones or fax or something that wasn’t for the internet but did allow communication to the outside world. If you had something consistent like power line voltage or water pressure you could use changes in that as binary. Basically stuxnet could control some secondary system as communication if something simple like phone lines or RF wasn’t available. Heck let’s get crazy. It could hijack an exterior camera and watch for smoke signals sent by a spy elsewhere in the country and could hijack a lamp post to flicker on and off to transmit. The possibilities are endless if you are creative enough and the virus has control of enough systems.

    • @keefymckeefface8330
      @keefymckeefface8330 2 หลายเดือนก่อน

      @@Pepesilvia267 or it just waits for someone working there to get careless and charge their phone.