Stuxnet Could be Re-Engineered for Constructing Inexpensive MalwareAccording to Eugene Kaspersky who founded Kaspersky the IT security company, civilian hackers could re-engineer the Stuxnet virus much more inexpensively and use it for causing a great deal of further destruction. The virus, understandably, was originally the creation of the Israeli and U.S government agencies seeking to bring down the Iranian nuclear system, stated Techworld.com in news on March 29, 2011. Moreover, Eugene elaborates that Stuxnet exploited certain program vulnerabilities that currently have patches to fix them. However, that doesn't imply that the malware won't be adapted for further use, he says. Additionally according to the Kaspersky founder, there's little problem in cracking the code for finding out its method of operation, for pulling out the components as well as to design it afresh in another style. All this alarmingly indicates that a fresh age of cyber-sabotage and cyber-wars has started, he adds. Furthermore, security investigators at Kaspersky Lab after gathering details from the virus realize that it's high-end malicious software. Remarking about this, the investigators state that for developing such malicious software, there is requirement of an enormous budget. Quite naturally, they aren't the ordinary criminals on the Web who can create this kind of malware. Techworld.com reported this on March 29, 2011. Said Chief Stephan Lechner responsible for the Institute handling citizens' security and safeguard, the virus' code was so complicated that only government agencies could develop it. Nevertheless, unscrupulous businesses could replicate an edition that was less refined, he indicated with conviction. Uk.msn.com reported this on March 25, 2011. Lechner, at present, thinks that only intelligence services have the ability for devising such an assault; however, he stated that if anybody desired designing it again in a less sophisticated version then the capability possibly rested with industrial players. Uk.msn.com reported this on March 25, 2011. Of course that version wouldn't be same as the original one of Stuxnet although it could be nearly same and hence capable of inflicting destruction on any specific target without difficulty while such instances would likely be more frequent during the forthcoming period, Lechner added. Uk.msn.com reported this in news on March 25, 2011. Related article: Stuxnet malware Signed With JMicron Certificate ยป SPAMfighter News - 4/6/2011 |
Dear Reader
We are happy to see you are reading our IT Security News.
We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!