meta_pixel
Tapesearch Logo
Log in
Malicious Life

The Stuxnet Virus Pt. 3

Malicious Life

Malicious Life

Technology

4.81K Ratings

🗓️ 12 July 2018

⏱️ 30 minutes

🧾️ Download transcript

Summary

Stuxnet was a devastating weapon, but who wielded it? That is the question we try to answer with the final installment of our Stuxnet series. In this episode, we explore other, similar battles of the modern cyber war, and look further into the topic of Zero Day vulnerabilities. With special guests: Andrew Ginter, and Blake […] Advertising Inquiries: https://redcircle.com/brands

Transcript

Click on a timestamp to play from that location

0:00.0

Hi, welcome to Malicious Life. I'm Ran Levy.

0:16.0

Here's the third and final part of our series on Stuxnet, the Worms

0:19.8

that struck the Iranian nuclear program. We'll be talking this time about the software

0:24.4

bug that caused this ultra sophisticated weapon to be discovered and about

0:29.1

Stuxnet to sister worms, duku and flame.

0:33.0

Enjoy the episode.

0:34.0

The last two parts of the episode focused on the technological characteristics of Staxnet, a computer virus that attacked the Uranium enrichment facility in Iran and was exposed in 2010 almost accidentally by a small IT company from Belarus.

0:58.0

We describe the way the malicious software penetrated the facility's network, located the control systems computers,

1:06.2

and finally started messing with the gas centrifuges by increasing and decreasing their rotation

1:12.2

speed, all while presenting pre-recorded false data to the

1:16.3

technicians and programmers.

1:18.8

This level of sophistication made Stuxnet a groundbreaking malware, the first real cyber weapon.

1:25.0

Now it's time to talk about the people who created it.

1:32.0

In the computer security business, the people who created it.

1:33.0

In the computer security business, this question is usually considered to be secondary.

1:38.0

In most cases, even if we do catch the creators of malicious software and punish them, the software itself still

1:46.1

continues to spread.

1:48.0

It's like a man releasing a lion from its cage.

1:51.2

We might be able to punish the man, but the priority is catching the lion

1:55.7

before it gets downtown. In Stuxet's case, however, identifying the creators of the software isn't secondary at all.

2:06.1

On the contrary, if it's possible to prove that it was created by a government agency,

2:11.7

then a tax net becomes much more than a computer virus.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from Malicious Life, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of Malicious Life and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.