FBI Investigating Stuxnet Leak

Posted by Sam Churchill on

The FBI is investigating who spilled Stuxnet secrets, the classified cyberattack program that the U.S. launched against Iran nuclear facilities. Senator Dianne Feinstein has called for Capitol Hill hearings into the leak since ‘disclosures of this type endanger American lives and undermine America’s national security.’

It moved from conspiracy theory to a cybersecurity bombshell when the New York Times reported that the Bush administration authorized the cyber weapon program codenamed Olympic Games and President Obama continued increased cyberattacks on Iran nuclear facilities, reports Network World.

“A number of those leaks, and others in the last months about drone activities and other activities, are frankly all against national-security interests,” said Sen. John Kerry (D-Mass.), chairman of the Foreign Relations Committee. “I think they’re dangerous, damaging, and whoever is doing that is not acting in the interest of the United States of America.”

“I think it’s pretty clear that the United States government did the Stuxnet attack,” said Richard Clarke in a Smithsonian interview.

In a TED Talk recorded in February 2011, security expert Ralph Langner stated that, “The leading force behind Stuxnet is the cyber superpower – there is only one; and that’s the United States.”

Meanwhile, the Flame malware that infected computers in Iran achieved mathematic breakthroughs that could only have been accomplished by world-class cryptographers, two of the world’s foremost cryptography experts said.

According to Marc Stevens and B.M.M. de Weger, the collision attack was unlike any that cryptographers have seen before.

“It’s not a garden-variety collision attack, or just an implementation of previous MD5 collisions papers—which would be difficult enough,” Matthew Green, a professor specializing in cryptography in the computer science department at Johns Hopkins University, told Ars. “There were mathematicians doing new science to make Flame work.”

Flame eavesdrops on conversations, takes screenshots and steals data from infected computers without being detected. Wired’s Kim Zetter discusses how the malicious code works on Science Friday.

Related Dailywireless articles include; The Stuxnet Story, Flame: The World’s Most Complex Computer Virus?, US and China Coordinate “War Games”, ISPs Adopt Cyber Security Recommendations, Russians Not Controling Springfield Water Pumps, Dueling Cyber Security Bills, SCADA: How Big a Threat?, Stuxnet: Year One, Cyber War: The New Frontier, Satellite Hacked?, Chinese Telecoms Investigated As Security Threat, Wireless Providers Team on AMR and SmartGrid.

Posted by Sam Churchill on Friday, June 8th, 2012 at 7:20 am .

Leave a Reply