The Stuxnet Worm Source Code: Is it a Threat or a Boon? - This 8-Bit Life
A decrypted version of the Stuxnet worm that ravaged Siemens SCADA Industrial systems worldwide around 2010 has been out in the wild for a little over a year now. The source code is freely downloadable and easily found in quite a few different places. In fact I have embedded the source code from pastebin below for your perusal. This is of course a bit of an old story but I bring it up because I find it fascinating. I’m very curious to see where this will go from here.
It will be interesting to see if this leads to new variants of the worm or even an evolution of its attack method. The payload of the worm originally targeted Siemens S7-300 PLC devices of a very specific configuration. This lead many to believe that it was purpose-built to attack a specific target while still infecting enough other systems to mask itself for a while. It should also be noted that the work had the largest effect on Iran’s Industrial systems. There has been much unverified speculation that the worm was a joint venture between the US and Israel to hinder Iran’s nuclear enrichment attempts.
Rumors and speculation aside the worm was very effective. If we do start seeing new modified versions or even completely new worms based on the concepts that Stuxnet layed out we may see a whole new level of network warfare between countries. I’ll be keeping an eye on this story and post as I hear things. In the meantime you should check out the source code above. I’ll be reading through it myself on my lunch break.