It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
(visit the link for the full news article)
Is the Stuxnet computer malworm back on the warpath in Iran?
Exhaustive investigations into the deadly explosion last Saturday, Nov. 12 of the Sejil-2 ballistic missile at the Revolutionary Guards (IRGC) Alghadir base point increasingly to a technical fault originating in the computer system controlling the missile and not the missile itself. The head of Iran's ballistic missile program Maj. Gen. Hassan Moghaddam was among the 36 officers killed in the blast which rocked Tehran 46 kilometers
Originally posted by Ben81
If Hitler knew how to lie like this
he would be king of the world today ..
sandfedit on 11/28/2011 by Ben81 because: (no reason given)
Originally posted by purplemer
reply to post by nightbringr
Stuxnet was made to work in an industrial setting with very specific parameters. Its not likely it will work in a missle base..
The entirety of the Stuxnet code has not yet been disclosed, but its payload targets only those SCADA configurations that meet criteria that it is programmed to identify.[24] Stuxnet requires specific slave variable-frequency drives (frequency converter drives) to be attached to the targeted Siemens S7-300 system and its associated modules. It only attacks those PLC systems with variable-frequency drives from two specific vendors: Vacon based in Finland and Fararo Paya based in Iran.[41] Furthermore, it monitors the frequency of the attached motors, and only attacks systems that spin between 807 Hz and 1210 Hz. The industrial applications of motors with these parameters are diverse, and may include pumps or gas centrifuges.
Stuxnet installs malware into memory block DB890 of the PLC that monitors the Profibus messaging bus of the system.[35] When certain criteria are met, it periodically modifies the frequency to 1410 Hz and then to 2 Hz and then to 1064 Hz, and thus affects the operation of the connected motors by changing their rotational speed.[41] It also installs a rootkit—the first such documented case on this platform—that hides the malware on the system and masks the changes in rotational speed from monitoring systems.
Originally posted by nightbringr
Suspicion in Iran that Stuxnet caused Revolutionary Guards base explosions
www.debka.com
(visit the link for the full news article)
Is the Stuxnet computer malworm back on the warpath in Iran?
Exhaustive investigations into the deadly explosion last Saturday, Nov. 12 of the Sejil-2 ballistic missile at the Revolutionary Guards (IRGC) Alghadir base point increasingly to a technical fault originating in the computer system controlling the missile and not the missile itself. The head of Iran's ballistic missile program Maj. Gen. Hassan Moghaddam was among the 36 officers killed in the blast which rocked Tehran 46 kilometers
Originally posted by nightbringr
reply to post by Maxmars
Thank you. Only posted it in breaking news because i thought perhaps it had bearing on todays reported explosion.
Originally posted by Aim64C
If you could blow them up with a virus... why blow up only one of them?
Originally posted by purplemer
reply to post by nightbringr
Stuxnet was made to work in an industrial setting with very specific parameters. Its not likely it will work in a missle base..