Open In App

The Stuxnet Attack

In mid-2010, the United Nations body, and the International Atomic Energy Agency noticed an uncommon commotion at the Natanz Uranium Enrichment Facility Plant. The authorities there had been supplanting an unordinary volume of the axis tubes used to enrich uranium. Abnormal events began occurring with a portion of the PCs shutting and starting themselves in a fluctuating pattern. 

The assaults appeared to target the Iranian Nuclear Infrastructure. It was fundamentally focused on the Programmable Logic Controllers (PLCs) utilized at the facility.  Slowly, the mist lifted and the target of the assault was becoming clearer – it was to harm the rotators introduced at the plant in Natanz.



What is Stuxnet and Who Created It?

Working and Purpose of Stuxnet Attack:

Protecting Industrial Networks Against Stuxnet Attacks:

Different projects considering comparative plots are utilizing pieces of code utilized in Stuxnet. It has now been set as a future benchmark for cyber militants and rogue hackers. The outcome of Stuxnet is presently being felt by the world in the weapons contest that has followed the advent of such a digital munitions stockpile.

Legacy of Stuxnet:

With the coming of Stuxnet, there has been an expanding interest for network safety experts to attempt to ensure the safety of essential, strategic, and key government fortifications  This has now become a signal of a model for digital protection concerning nuclear/thermal power, which made different nations employ all the more regular specialists in the cyber network safety domain space. This has likewise energized the creation of various Standard Operating Procedures for digital protection as opposed to the essentially ordinary methods that were at that point set up while the assault happened. The impact of this virus is felt in the cyber realm to this very date. 



Article Tags :