meta_pixel
Tapesearch Logo
Log in
Malicious Life

Stuxnet, part 3

Malicious Life

Malicious Life

Technology

4.81K Ratings

🗓️ 2 October 2017

⏱️ 30 minutes

🧾️ Download transcript

Summary

Stuxnet was a devastating weapon, but who wielded it? That is the question we try to answer with the final installment of our Stuxnet series. In this episode, we explore other, similar battles of the modern cyber war, and look further into the topic of Zero Day vulnerabilities. With special guests: Andrew Ginter, and Blake […] Advertising Inquiries: https://redcircle.com/brands

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to malicious life. I'm Ran Levy.

0:03.4

This week's episode is the third and final part of our series on Stuxnet,

0:08.7

the computer virus that struck the Iranian nuclear program. The last two parts of the episode focused on the technological characteristics of Staxnet,

0:30.8

a computer virus that attacked the Uranium enrichment facility in Iran and was exposed

0:36.6

in 2010 almost accidentally by a small IT company from Belarus. We described the way the malicious software

0:45.2

penetrated the facilities network, located the control systems computers,

0:50.2

and finally started messing with the gas centrifuges by increasing and decreasing their rotation speed,

0:57.0

all while presenting pre-recorded false data to the technicians and programmers.

1:02.0

This level of sophistication to the technicians and programmers.

1:03.0

This level of sophistication made Stuxnet a groundbreaking malware,

1:08.0

the first real cyber weapon.

1:10.0

Now it's time to talk about the people who created it.

1:17.0

In the computer security business, this question is usually considered to be secondary.

1:22.0

In most cases, even if we do... is usually considered to be secondary.

1:22.5

In most cases, even if we do catch the creators of malicious software

1:27.5

and punish them, the software itself still continues to spread.

1:32.0

It's like a man releasing a lion from its cage.

1:35.0

We might be able to punish the man, but the priority is catching the lion

1:40.0

before it gets downtown.

1:43.0

In Stuxnet's case, however,

1:45.0

identifying the creators of the software

1:48.0

isn't secondary at all.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from Malicious Life, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of Malicious Life and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.