Recent research into old malware threats associated with the Stuxnet attacks against Iran's nuclear program roughly one decade ago turned up several new discoveries, including a possible fourth collaborator in the clandestine operation, as well as previously unknown versions of Flame and Duqu malware.

Today, Alphabet's cybersecurity subsidiary Chronicle revealed the findings of its researchers Juan Andres Guerrero-Saade and Silas Cutler at a Kaspersky conference in Singapore, as well as in a company blog post that was supplemented by more detailed analytical reports [1, 2, 3].

The sequence of discoveries can all be traced back to single clue, gleaned from a 2017 security presentation, that suggested a new link between
the modular cyber espionage malware known as Flame and a group of nation-state actors presumed to be involved in the Stuxnet malware attack. This attack caused programmable logic controllers to malfunction in Iran's Natanz nuclear facility, resulting in centrifuge damage that at the time set back Iran's nuclear ambitions.

Please register to continue.

Already registered? Log in.

Once you register, you'll receive:

  • News analysis

    The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.

  • Archives

    Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.

  • Daily Newswire

    SC Media’s essential morning briefing for cybersecurity professionals.

  • Learning Express

    One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.