Get the latest tech news

Water Pump Used To Get $1 Billion Stuxnet Malware Into Iranian Nuclear Facility


An anonymous reader quotes a report from SecurityWeek.com: A Dutch engineer recruited by the country's intelligence services used a water pump to deploy the now-infamous Stuxnet malware in an Iranian nuclear facility, according to a two-year investigation conducted by Dutch newspaper De Volkskrant. ...

Van Sabben was allegedly recruited in 2005 -- a couple of years before the Stuxnet malware was triggered -- after American and Israeli intelligence agencies asked their Dutch counterpart for help. [...] Michael Hayden, who at the time was the chief of the CIA, did agree to talk to De Volkskrant, but could not confirm whether Stuxnet was indeed delivered via water pumps due to it still being classified information. One interesting piece of information that has come to light in De Volkskrant's investigation is that Hayden reportedly told one of the newspaper's sources that it cost between $1 and $2 billion to develop Stuxnet.

Get the Android app

Or read this on Slashdot

Read more on:

Photo of Iranian

Iranian

Photo of water pump

water pump

Photo of stuxnet malware

stuxnet malware

Related news:

News photo

Iranian cyberspies target US defense orgs with new backdoor

News photo

Iranian-Linked Hacks Expose Failure to Safeguard US Water System

News photo

Possible Iranian Group Behind 'Flood' of New Cyberattacks in Israel