-
kticfrs500
at December 13,2016
Wow! I’ve not seen many insidious ways to illegally enter a system. Most of the crime that occurred in the videos for this course had a simple and direct goal. Designing malware in such a way that is as undetectable as this is brilliant…and to have it so coordinated that it would remain low key in multiple machines! I wonder that if the wiki leaks were indeed caused by the hacking by one of our adversaries to influence the election, was it done in a manner that would be undetectable like this…
-
CyberRanger
at December 14,2016
I think its great that people are able to find out how Stuxnet works. But if its available for people to research what is stopping someone to reweaponize this malware. I think its great understanding its capabilities, but not all people have the same agenda. What other type of programs as such exist.
-
kkelani
at December 14,2016
Stuxnet is definitely scary! It is amazing how fast the spread on its own.
-
aki
at December 15,2016
Stuxnet attacked Windows systems using an unprecedented four zero-day attacks.t is initially spread using infected removable drives such as USB flash drives and then uses other exploits and techniques such as peer-to-peer RPC to infect and update other computers inside private networks that are not directly connected to the Internet.
-
ahammes12
at December 16,2016
I found this to be very informative on Stuxnet. The amount of time and engineering that went into creating and executing this virus is beyond impressive. They were able to create a tiny virus that opened shares, conducted peer-to-peer updates, all the while working on two totally different systems not speaking the same language. These lay dormant while collecting data about the upgrading devices. Considering the potential harm something like this could entail, it’s very impressive.