Home > Cyber News > Stuxnet All Over Again? What Happened at Iran’s Natanz Enrichment Facility?

Stuxnet All Over Again? What Happened at Iran’s Natanz Enrichment Facility?

Stuxnet All Over Again-What Happened at Iran's Natanz Enrichment FacilityRemember Stuxnet? Described as “the first digital weapon,” the devastating computer worm caused substantial damage to Iran’s nuclear program.

Natanz Incident: What Happened?

According to an announcement made on Sunday, Iran shared that an accident impacted the electricity distribution network at its Natanz enrichment facility. The nuclear facility went offline, with Israeli cyber weapons being put to blame for it, The Register reported.

What happened? Iran officials believe that the cause for the incident at the Natanz facility was a result of nuclear terrorism, but it seems that no radioactive material has been exposed.

“Few nations like the idea of Iran enhancing its nuclear capabilities, but Israel is implacably opposed to the idea. In 1981 Israel bombed a nuclear plant in the early stages of construction and in the early 2000s 2010 is thought to have collaborated on the Stuxnet worm that eventually damaged centrifuges used to refine nuclear materials at Natanz,” TheRegister explained.

Shortly after the incident, the Israeli Public Broadcasting Corporation, an independent public broadcaster, said that intelligence sources shared that the accident can be classified as a cyber-attack.

Is this accident an indication of a new Stuxnet operation?

More about Stuxnet

In June, 2010, the devastating computer virus called Stuxnet was discovered lurking in the databases of power plants, traffic control systems, and other facilities around the world.

Stuxnet is more complex than any virus that has been released in the wild. Its capabilites included turning up the pressure inside a nuclear reactor or switching off entire oil pipelines while telling the system operators everything with their facility was normal.

Stuxnet was so sophisticated that it took researchers more than a year to reverse-engineer it. As F-Secure’s Mikko Hypponen said in an interview, some viruses take hours to reverse engineer, while Stuxnet took months to even begin to understand how it distributed from computer to computer.

Milena Dimitrova

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

More Posts

Follow Me:

Leave a Comment

Your email address will not be published. Required fields are marked *

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree