Skip navigation

Tag Archives: stuxnet

 

ISSUED BY: GCIS Communications Command Center

SOURCE: Homeland Security NewsWire

01April2011 8:59amEST

GCIS INTELLIGENCE UPDATE: Federal officials have long sought to secure critical infrastructure from potential attack, and recent events like the 2003 blackouts and the Stuxnet virus have added increasing urgency to government and private sector efforts; speaking on a panel at the Government Security conference and expo in Washington, D.C., security experts that specialize in critical infrastructure discussed the challenges of protecting infrastructure and steps that both governments and businesses can take; experts discussed addressing vulnerabilities in the smart grid, Stuxnet as a game changing cyber attack, and protecting critical infrastructure as a portfolio management problem. (read full report)

"GCIS INTELLIGENCE UPDATE" is an intelligence briefing presented by Griffith Colson Intelligence Service, and provided to the public for informative purposes only. All subject matter is credited to it's source of origin, and is not intended to represent original content authored by GCIS, it's partners or affiliates. All opinions presented are those of the author, and not necessarily those of GCIS or it's partners.

ISSUED BY: GCIS Communications Command Center

SOURCE: The Washington Times

28February2011 8:00amEST

GCIS INTELLIGENCE UPDATE: TEHRAN, Iran — In a major setback to Iran‘s nuclear program, technicians will have to unload fuel from the country’s first atomic power plant because of an unspecified safety concern, a senior government official said.

Virus Attack on BushehrThe vague explanation raised questions about whether the mysterious computer worm known as Stuxnet might have caused more damage at the Bushehr plant than previously acknowledged. Other explanations are possible for unloading the fuel rods from the reactor core of the newly completed plant, including routine technical difficulties.

While the exact reason behind the fuel’s removal is unclear, the admission is seen as a major embarrassment for Tehran because it has touted Bushehr — Iran‘s first atomic power plant — as its showcase nuclear facility and sees it as a source of national pride. When the Islamic Republic began loading the fuel just four months ago, Iranian officials celebrated the achievement.

Iran‘s envoy to the U.N. nuclear monitoring agency in Vienna said that Russia, which provided the fuel and helped construct the Bushehr plant, had demanded the fuel be taken out. (read full report)

"GCIS INTELLIGENCE UPDATE" is an intelligence briefing presented by Griffith Colson Intelligence Service, and provided to the public for informative purposes only. All subject matter is credited to it's source of origin, and is not intended to represent original content authored by GCIS, it's partners or affiliates. All opinions presented are those of the author, and not necessarily those of GCIS or it's partners.

 

ISSUED BY: GCIS Communications Command Center

SOURCE: Wired.com: Threat Level

12February2011 5:39pmEST

GCIS CYBER-SECURITY UPDATE: Attackers behind the Stuxnet computer worm focused on targeting five organizations in Iran that they believed would get them to their final target in that Stuxnetcountry, according to a new report from security researchers.

The five organizations, believed to be the first that were infected with the worm, were targeted in five separate attacks over a number of months in 2009 and 2010, before Stuxnet was discovered in June 2010 and publicly exposed. Stuxnet spread from these organizations into other organizations on its way to its final target, which is believed to have been a nuclear enrichment facility or facilities in Iran.

“These five organizations were infected, and from those five computers Stuxnet spread out — not to just computers in those organizations, but to other computes as well,” says Liam O Murchu, manager of operations for Symantec Security Response. “It all started with those five original domains.” (read full report)

 

 

"GCIS INTELLIGENCE UPDATE" is an intelligence briefing presented by Griffith Colson Intelligence Service, and provided to the public for informative purposes only. All subject matter is credited to it's source of origin, and is not intended to represent original content authored by GCIS, it's advertisers or affiliates. All opinions presented are those of the author, and not necessarily those of GCIS or it's partners.